Search dblp for Publications

export results for "security application"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@book{DBLP:books/ws/Brooks24,
  author       = {Tyson T. Brooks},
  title        = {Cloud to Edgeware - Wireless Grid Applications, Architecture and Security
                  for the Internet of Things},
  publisher    = {WorldScientific},
  year         = {2024},
  url          = {https://doi.org/10.1142/9354},
  doi          = {10.1142/9354},
  isbn         = {9789814630801},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/ws/Brooks24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MohsenRLKWM24,
  author       = {Fadi Mohsen and
                  Usman Rauf and
                  Victor Lavric and
                  Alexander Kokushkin and
                  Zhiyuan Wei and
                  Adalynn Martinez},
  title        = {On Identification of Intrusive Applications: {A} Step Toward Heuristics-Based
                  Adaptive Security Policy},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {37586--37599},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3373202},
  doi          = {10.1109/ACCESS.2024.3373202},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MohsenRLKWM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bspc/NadhanJ24,
  author       = {Archana S. Nadhan and
                  Israel Jeena Jacob},
  title        = {Enhancing healthcare security in the digital era: Safeguarding medical
                  images with lightweight cryptographic techniques in IoT healthcare
                  applications},
  journal      = {Biomed. Signal Process. Control.},
  volume       = {88},
  number       = {Part {B}},
  pages        = {105511},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.bspc.2023.105511},
  doi          = {10.1016/J.BSPC.2023.105511},
  timestamp    = {Mon, 01 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bspc/NadhanJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/WenhuaHJISAAK24,
  author       = {Zhang Wenhua and
                  Mohammad Kamrul Hasan and
                  Norleyza Binti Jailani and
                  Shayla Islam and
                  Nurhizam Safie and
                  Hussain Mobarak Albarakati and
                  Abeer Aljohani and
                  Muhammad Attique Khan},
  title        = {A lightweight security model for ensuring patient privacy and confidentiality
                  in telehealth applications},
  journal      = {Comput. Hum. Behav.},
  volume       = {153},
  pages        = {108134},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.chb.2024.108134},
  doi          = {10.1016/J.CHB.2024.108134},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chb/WenhuaHJISAAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhouZC24,
  author       = {Chunning Zhou and
                  Wentao Zhang and
                  Weiwei Cao},
  title        = {A New Approach of Evaluating the Security Against Differential and
                  Linear Cryptanalysis and Its Applications to Serpent, {NOEKEON} and
                  {ASCON}},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {274--291},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac173},
  doi          = {10.1093/COMJNL/BXAC173},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhouZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/KangKK24,
  author       = {Giluk Kang and
                  Jahoon Koo and
                  Young{-}Gab Kim},
  title        = {Security and Privacy Requirements for the Metaverse: {A} Metaverse
                  Applications Perspective},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {62},
  number       = {1},
  pages        = {148--154},
  year         = {2024},
  url          = {https://doi.org/10.1109/MCOM.014.2200620},
  doi          = {10.1109/MCOM.014.2200620},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cm/KangKK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CaraveoCacepVZ24,
  author       = {Miguel Antonio Caraveo{-}Cacep and
                  Rub{\'{e}}n V{\'{a}}zquez{-}Medina and
                  Antonio Hern{\'{a}}ndez Zavala},
  title        = {A review on security implementations in soft-processors for IoT applications},
  journal      = {Comput. Secur.},
  volume       = {139},
  pages        = {103677},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103677},
  doi          = {10.1016/J.COSE.2023.103677},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CaraveoCacepVZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eait/Su24,
  author       = {Jun{-}Ming Su},
  title        = {WebHOLE: Developing a web-based hands-on learning environment to assist
                  beginners in learning web application security},
  journal      = {Educ. Inf. Technol.},
  volume       = {29},
  number       = {6},
  pages        = {6579--6610},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10639-023-12090-z},
  doi          = {10.1007/S10639-023-12090-Z},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eait/Su24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/HabbalAA24,
  author       = {Adib Habbal and
                  Mohamed Khalif Ali and
                  Mustafa Ali Abuzaraida},
  title        = {Artificial Intelligence Trust, Risk and Security Management {(AI}
                  TRiSM): Frameworks, applications, challenges and future research directions},
  journal      = {Expert Syst. Appl.},
  volume       = {240},
  pages        = {122442},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2023.122442},
  doi          = {10.1016/J.ESWA.2023.122442},
  timestamp    = {Sun, 26 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/HabbalAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/NagHDSCKSA24,
  author       = {Anindya Nag and
                  Md. Mehedi Hassan and
                  Ayontika Das and
                  Anurag Sinha and
                  Nisarga Chand and
                  Anwesha Kar and
                  Vandana Sharma and
                  Ahmed Alkhayyat},
  title        = {Exploring the applications and security threats of Internet of Thing
                  in the cloud computing paradigm: {A} comprehensive study on the cloud
                  of things},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {35},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/ett.4897},
  doi          = {10.1002/ETT.4897},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/NagHDSCKSA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/AlrubayyiANAJ24,
  author       = {Hadeel Alrubayyi and
                  Moudy Sharaf Alshareef and
                  Zunaira Nadeem and
                  Ahmed M. Abdelmoniem and
                  Mona Jaber},
  title        = {Security Threats and Promising Solutions Arising from the Intersection
                  of {AI} and IoT: {A} Study of IoMT and IoET Applications},
  journal      = {Future Internet},
  volume       = {16},
  number       = {3},
  pages        = {85},
  year         = {2024},
  url          = {https://doi.org/10.3390/fi16030085},
  doi          = {10.3390/FI16030085},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/AlrubayyiANAJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-blc/SharmaSAS24,
  author       = {Rajendra Kumar Sharma and
                  Ritumoni Sarma and
                  Neha Arora and
                  Vidya Sagar},
  title        = {Multisecret-sharing scheme with two-level security and its applications
                  in blockchain},
  journal      = {{IET} Blockchain},
  volume       = {4},
  number       = {1},
  pages        = {30--42},
  year         = {2024},
  url          = {https://doi.org/10.1049/blc2.12042},
  doi          = {10.1049/BLC2.12042},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-blc/SharmaSAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SivakumarJVS24,
  author       = {A. Sivakumar and
                  Jency Rubia J and
                  Hima Vijayan and
                  C. Sivakumaran},
  title        = {Detection of Botnet using deep learning algorithm: application of
                  machine learning in cyber-security},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {16},
  number       = {2},
  pages        = {213--222},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJESDF.2024.137030},
  doi          = {10.1504/IJESDF.2024.137030},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/SivakumarJVS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/MartinezCepedaMTOA24,
  author       = {Ver{\'{o}}nica Isabel Mart{\'{\i}}nez{-}Cepeda and
                  Mar{\'{\i}}a Jos{\'{e}} P{\'{a}}rraga Moreira and
                  Vinicio Leonardo Borja Tapia and
                  Luis Armando Ortiz{-}Delgado and
                  Diego Ricardo Salazar Armijos},
  title        = {{ESPE} Security: Mobile and Web Application to Manage Community Emergency
                  Alerts},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {18},
  number       = {5},
  pages        = {77--90},
  year         = {2024},
  url          = {https://doi.org/10.3991/ijim.v18i05.46781},
  doi          = {10.3991/IJIM.V18I05.46781},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/MartinezCepedaMTOA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijin/HangXZGL24,
  author       = {Feilu Hang and
                  Linjiang Xie and
                  Zhenhong Zhang and
                  Wei Guo and
                  Hanruo Li},
  title        = {Research on the application of network security defence in database
                  security services based on deep learning integrated with big data
                  analytics},
  journal      = {Int. J. Intell. Networks},
  volume       = {5},
  pages        = {101--109},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ijin.2024.02.006},
  doi          = {10.1016/J.IJIN.2024.02.006},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijin/HangXZGL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwin/QaziKHA24,
  author       = {Farheen Qazi and
                  Sadiq Ali Khan and
                  Fozia Hanif and
                  Dur{-}e{-}Shawar Agha},
  title        = {Efficient Routing Algorithm Towards the Security of Vehicular Ad-Hoc
                  Network and Its Applications},
  journal      = {Int. J. Wirel. Inf. Networks},
  volume       = {31},
  number       = {1},
  pages        = {12--28},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10776-023-00613-x},
  doi          = {10.1007/S10776-023-00613-X},
  timestamp    = {Mon, 26 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijwin/QaziKHA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/SafdarSAH24,
  author       = {Muhammad Umair Safdar and
                  Tariq Shah and
                  Asif Ali and
                  Tanveer ul Haq},
  title        = {Construction of algebraic complex 9-bit lookup tables using non-chain-ring
                  and its applications in data security},
  journal      = {Integr.},
  volume       = {94},
  pages        = {102095},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.vlsi.2023.102095},
  doi          = {10.1016/J.VLSI.2023.102095},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/integration/SafdarSAH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/KalhoroSKAA24,
  author       = {Shadab Kalhoro and
                  Farhan Bashir Shaikh and
                  Anam Kalhoro and
                  Junaid Ur Rehman Abbasi and
                  Ramesh Kumar Ayyasamy},
  title        = {An Overview of Security Attacks in 5G Enabled Technologies: Applications
                  and Use Case Scenarios},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {17--35},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2023.354872.829},
  doi          = {10.22042/ISECURE.2023.354872.829},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/KalhoroSKAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/FowdurH24,
  author       = {Tulsi Pawan Fowdur and
                  Shua{\"{\i}}b Hosenally},
  title        = {A real-time machine learning application for browser extension security
                  monitoring},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {1},
  pages        = {16--41},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2022.2128944},
  doi          = {10.1080/19393555.2022.2128944},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/FowdurH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AdilSKFJ24,
  author       = {Muhammad Adil and
                  Houbing Song and
                  Muhammad Khurram Khan and
                  Ahmed Farouk and
                  Zhanpeng Jin},
  title        = {5G/6G-enabled metaverse technologies: Taxonomy, applications, and
                  open security challenges with future research directions},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {223},
  pages        = {103828},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jnca.2024.103828},
  doi          = {10.1016/J.JNCA.2024.103828},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AdilSKFJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/NguyenNG24,
  author       = {Tri Nguyen and
                  Huong Nguyen and
                  Tuan Nguyen Gia},
  title        = {Exploring the integration of edge computing and blockchain IoT: Principles,
                  architectures, security, and applications},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {226},
  pages        = {103884},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jnca.2024.103884},
  doi          = {10.1016/J.JNCA.2024.103884},
  timestamp    = {Mon, 27 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/NguyenNG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/ChehidaRGM24,
  author       = {Salim Chehida and
                  {\'{E}}ric Rutten and
                  Guillaume Giraud and
                  St{\'{e}}phane Mocanu},
  title        = {A model-based approach for self-adaptive security in {CPS:} Application
                  to smart grids},
  journal      = {J. Syst. Archit.},
  volume       = {150},
  pages        = {103118},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.sysarc.2024.103118},
  doi          = {10.1016/J.SYSARC.2024.103118},
  timestamp    = {Sun, 19 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/ChehidaRGM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/JeremiahAXP24,
  author       = {Sekione Reward Jeremiah and
                  Abir El Azzaoui and
                  Neal N. Xiong and
                  Jong Hyuk Park},
  title        = {A comprehensive survey of digital twins: Applications, technologies
                  and security challenges},
  journal      = {J. Syst. Archit.},
  volume       = {151},
  pages        = {103120},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.sysarc.2024.103120},
  doi          = {10.1016/J.SYSARC.2024.103120},
  timestamp    = {Sun, 19 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/JeremiahAXP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/KareemD24,
  author       = {Husam Kareem and
                  Dmitriy Dunaev},
  title        = {A novel low hardware configurable ring oscillator {(CRO)} {PUF} for
                  lightweight security applications},
  journal      = {Microprocess. Microsystems},
  volume       = {104},
  pages        = {104989},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.micpro.2023.104989},
  doi          = {10.1016/J.MICPRO.2023.104989},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mam/KareemD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/MathurPG24,
  author       = {Garima Mathur and
                  Anjana Pandey and
                  Sachin Goyal},
  title        = {A review on blockchain for {DNA} sequence: security issues, application
                  in {DNA} classification, challenges and future trends},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {2},
  pages        = {5813--5835},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-15857-1},
  doi          = {10.1007/S11042-023-15857-1},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/MathurPG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/SekarputriFHK24,
  author       = {Janitra Ariena Sekarputri and
                  Widia Resti Fitriani and
                  Achmad Nizar Hidayanto and
                  Sherah Kurnia},
  title        = {The roles of privacy, security, and dissatisfaction in affecting switching
                  intention on messenger applications},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {15},
  pages        = {45625--45651},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-17466-4},
  doi          = {10.1007/S11042-023-17466-4},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/SekarputriFHK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/X24,
  title        = {Applications of advanced artificial intelligence in multimedia and
                  information security},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {1},
  pages        = {3019},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-17843-z},
  doi          = {10.1007/S11042-023-17843-Z},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/X24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ojcs/GuoLMALAW24,
  author       = {Mengzhao Guo and
                  Zhi Lin and
                  Ruiqian Ma and
                  Kang An and
                  Dong Li and
                  Naofal Al{-}Dhahir and
                  Jiangzhou Wang},
  title        = {Inspiring Physical Layer Security With {RIS:} Principles, Applications,
                  and Challenges},
  journal      = {{IEEE} Open J. Commun. Soc.},
  volume       = {5},
  pages        = {2903--2925},
  year         = {2024},
  url          = {https://doi.org/10.1109/OJCOMS.2024.3392359},
  doi          = {10.1109/OJCOMS.2024.3392359},
  timestamp    = {Sun, 19 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ojcs/GuoLMALAW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saem/Sun24,
  author       = {Dengpan Sun},
  title        = {Application of decision system design based on improved association
                  rules in rural social security},
  journal      = {Int. J. Syst. Assur. Eng. Manag.},
  volume       = {15},
  number       = {3},
  pages        = {1273--1284},
  year         = {2024},
  url          = {https://doi.org/10.1007/s13198-023-02213-7},
  doi          = {10.1007/S13198-023-02213-7},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/saem/Sun24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DashSS24,
  author       = {Priyabrata Dash and
                  Monalisa Sarma and
                  Debasis Samanta},
  title        = {Privacy preserving unique identity generation from multimodal biometric
                  data for privacy and security applications},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.375},
  doi          = {10.1002/SPY2.375},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DashSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumarS24,
  author       = {Pawan Kumar and
                  Sukhdip Singh},
  title        = {Enhancing android application security: {A} novel approach using DroidXGB
                  for malware detection based on permission analysis},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.361},
  doi          = {10.1002/SPY2.361},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KumarS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MakinaLR24,
  author       = {Hela Makina and
                  Asma Ben Letaifa and
                  Abderrezak Rachedi},
  title        = {Survey on security and privacy in Internet of Things-based eHealth
                  applications: Challenges, architectures, and future directions},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.346},
  doi          = {10.1002/SPY2.346},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MakinaLR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scpe/Alharbe24,
  author       = {Nawaf Alharbe},
  title        = {Ontological Augmentation and Analytical Paradigms for Elevating Security
                  in Healthcare Web Applications},
  journal      = {Scalable Comput. Pract. Exp.},
  volume       = {25},
  number       = {1},
  pages        = {157--165},
  year         = {2024},
  url          = {https://doi.org/10.12694/scpe.v25i1.2108},
  doi          = {10.12694/SCPE.V25I1.2108},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scpe/Alharbe24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scpe/LiuLTZW24,
  author       = {Xiangying Liu and
                  Zhiqiang Li and
                  Zhuwei Tang and
                  Xiang Zhang and
                  Hongxia Wang},
  title        = {Application of Artificial Intelligence Technology in Electromechanical
                  Information Security Situation Awareness System},
  journal      = {Scalable Comput. Pract. Exp.},
  volume       = {25},
  number       = {1},
  pages        = {127--136},
  year         = {2024},
  url          = {https://doi.org/10.12694/scpe.v25i1.2280},
  doi          = {10.12694/SCPE.V25I1.2280},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scpe/LiuLTZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/NovikovaFDS24,
  author       = {Evgenia Novikova and
                  Elena Fedorchenko and
                  Alexandr Danilov and
                  Igor Saenko},
  title        = {Dataset Generation Methodology: Towards Application of Machine Learning
                  in Industrial Water Treatment Security},
  journal      = {{SN} Comput. Sci.},
  volume       = {5},
  number       = {4},
  pages        = {373},
  year         = {2024},
  url          = {https://doi.org/10.1007/s42979-024-02704-9},
  doi          = {10.1007/S42979-024-02704-9},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/NovikovaFDS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/KrishnaS24,
  author       = {Hosakota Vamshi Krishna and
                  Krovi Raja Sekhar},
  title        = {Enhancing security in IIoT applications through efficient quantum
                  key exchange and advanced encryption standard},
  journal      = {Soft Comput.},
  volume       = {28},
  number       = {3},
  pages        = {2671--2681},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00500-023-09585-9},
  doi          = {10.1007/S00500-023-09585-9},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/KrishnaS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/TajudeenAPAA24,
  author       = {M. Mubeen Tajudeen and
                  M. Syed Ali and
                  R. Perumal and
                  Hamed H. Alsulami and
                  Bashir Ahmad},
  title        = {Observer-based security control for Markov jump systems under hybrid
                  cyber-attacks and its application via event-triggered scheme},
  journal      = {Soft Comput.},
  volume       = {28},
  number       = {6},
  pages        = {5155--5171},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00500-023-09234-1},
  doi          = {10.1007/S00500-023-09234-1},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/TajudeenAPAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tai/LiangCP24,
  author       = {Hongjing Liang and
                  Zhenyu Chang and
                  Yingnan Pan},
  title        = {Dual-Event-Triggered Intelligence Security Control for Multiagent
                  Systems Against DoS Attacks With Applications in Mobile Robot Systems},
  journal      = {{IEEE} Trans. Artif. Intell.},
  volume       = {5},
  number       = {2},
  pages        = {916--924},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAI.2023.3275938},
  doi          = {10.1109/TAI.2023.3275938},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tai/LiangCP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/AgrahariASKGV24,
  author       = {Ashutosh Agrahari and
                  Ruchi Agarwal and
                  Pawan Singh and
                  Abhishek Singh Kilak and
                  Deepak Gupta and
                  Ankit Vidyarthi},
  title        = {Marvelous Hand: An IoT-Enabled Artificial Intelligence-Based Human-Centric
                  Biosensor Design for Consumer Personal Security Application},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {70},
  number       = {1},
  pages        = {1063--1070},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCE.2023.3320768},
  doi          = {10.1109/TCE.2023.3320768},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/AgrahariASKGV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcns/AghajanPM24,
  author       = {Adel Aghajan and
                  Keith Paarporn and
                  Jason R. Marden},
  title        = {Extension Theorems for General Lotto Games With Applications to Network
                  Security},
  journal      = {{IEEE} Trans. Control. Netw. Syst.},
  volume       = {11},
  number       = {1},
  pages        = {185--196},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCNS.2023.3272823},
  doi          = {10.1109/TCNS.2023.3272823},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcns/AghajanPM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/VaishASS24,
  author       = {Prashant Vaish and
                  Niharika Anand and
                  Vishal Krishna Singh and
                  Gaurav Sharma},
  title        = {Applications hosting over cloud-assisted {IOT:} a productivity model
                  and method defining accessibility of data security},
  journal      = {J. Supercomput.},
  volume       = {80},
  number       = {4},
  pages        = {5540--5564},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11227-023-05668-4},
  doi          = {10.1007/S11227-023-05668-4},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tjs/VaishASS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/PeldszusBJ24,
  author       = {Sven Peldszus and
                  Jens B{\"{u}}rger and
                  Jan J{\"{u}}rjens},
  title        = {UMLsecRT: Reactive Security Monitoring of Java Applications With Round-Trip
                  Engineering},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {50},
  number       = {1},
  pages        = {16--47},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSE.2023.3326366},
  doi          = {10.1109/TSE.2023.3326366},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tse/PeldszusBJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/WangS24,
  author       = {Fangzhou Wang and
                  A. Lee Swindlehurst},
  title        = {Applications of Absorptive Reconfigurable Intelligent Surfaces in
                  Interference Mitigation and Physical Layer Security},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {23},
  number       = {5},
  pages        = {3918--3931},
  year         = {2024},
  url          = {https://doi.org/10.1109/TWC.2023.3312693},
  doi          = {10.1109/TWC.2023.3312693},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/WangS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/WangS24,
  author       = {Fangzhou Wang and
                  A. Lee Swindlehurst},
  title        = {Applications of Absorptive Reconfigurable Intelligent Surfaces in
                  Interference Mitigation and Physical Layer Security},
  journal      = {{ACM} Trans. Web},
  volume       = {23},
  number       = {5},
  pages        = {3918--3931},
  year         = {2024},
  url          = {https://doi.org/10.1109/TWC.2023.3312693},
  doi          = {10.1109/TWC.2023.3312693},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tweb/WangS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/KumarS24a,
  author       = {Pawan Kumar and
                  Sukhdip Singh},
  title        = {An Efficient Security Testing for Android Application Based on Behavior
                  and Activities Using Improved {PCA} and {DNN-KNN} Classifier},
  journal      = {Wirel. Pers. Commun.},
  volume       = {135},
  number       = {2},
  pages        = {1285--1314},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11277-024-11128-w},
  doi          = {10.1007/S11277-024-11128-W},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/KumarS24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/MadhounHJMA24,
  author       = {Nour El Madhoun and
                  Badis Hammi and
                  Saad El Jaouhari and
                  Djamel Mesbah and
                  Elsi Ahmadieh},
  editor       = {Leonard Barolli},
  title        = {Addressing Security Challenges in Copyright Management Applications:
                  The Blockchain Perspective},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 38th International Conference on Advanced Information Networking
                  and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024,
                  Volume 6},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {204},
  pages        = {169--182},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57942-4\_18},
  doi          = {10.1007/978-3-031-57942-4\_18},
  timestamp    = {Mon, 15 Apr 2024 14:21:46 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/MadhounHJMA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/PhaenthongN24,
  author       = {Ratiros Phaenthong and
                  Sudsanguan Ngamsuriyaroj},
  editor       = {Leonard Barolli},
  title        = {Analyzing Security and Privacy Risks in Android Video Game Applications},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 38th International Conference on Advanced Information Networking
                  and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024,
                  Volume 6},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {204},
  pages        = {307--319},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57942-4\_30},
  doi          = {10.1007/978-3-031-57942-4\_30},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/PhaenthongN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/AhmedA24,
  author       = {Sabrina Ahmed and
                  Mohammed Zamshed Ali},
  title        = {Application-Specific Security in IoT Network},
  booktitle    = {21st {IEEE} Consumer Communications {\&} Networking Conference,
                  {CCNC} 2024, Las Vegas, NV, USA, January 6-9, 2024},
  pages        = {636--637},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/CCNC51664.2024.10454649},
  doi          = {10.1109/CCNC51664.2024.10454649},
  timestamp    = {Tue, 26 Mar 2024 22:14:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/AhmedA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/KhooKRM24,
  author       = {Yi Xuan Khoo and
                  Rachael M. Kang and
                  Tera L. Reynolds and
                  Helena M. Mentis},
  editor       = {Florian 'Floyd' Mueller and
                  Penny Kyburz and
                  Julie R. Williamson and
                  Corina Sas and
                  Max L. Wilson and
                  Phoebe O. Toups Dugas and
                  Irina Shklovski},
  title        = {"That's Kind of Sus(picious)": The Comprehensiveness of Mental Health
                  Application Users' Privacy and Security Concerns},
  booktitle    = {Proceedings of the {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2024, Honolulu, HI, USA, May 11-16, 2024},
  pages        = {789:1--789:16},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3613904.3642705},
  doi          = {10.1145/3613904.3642705},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/KhooKRM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpits/VoievodinR24,
  author       = {Yevhenii Voievodin and
                  Inna Rozlomii},
  editor       = {Volodymyr Sokolov and
                  Vasyl Ustimenko and
                  Tamara Radivilova and
                  Mariya Nazarkevych},
  title        = {Application Security Optimization in Container Orchestration Systems
                  Through Strategic Scheduler Decisions (short paper)},
  booktitle    = {Proceedings of the Workshop Cybersecurity Providing in Information
                  and Telecommunication Systems {(CPITS} 2024), Kyiv, Ukraine, February
                  28, 2024 (online)},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3654},
  pages        = {471--478},
  publisher    = {CEUR-WS.org},
  year         = {2024},
  url          = {https://ceur-ws.org/Vol-3654/short16.pdf},
  timestamp    = {Thu, 11 Apr 2024 17:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cpits/VoievodinR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ehealth2/MaulKRW24,
  author       = {Lukas Maul and
                  Ines Kramer and
                  Lena Rettinger and
                  Franz Werner},
  editor       = {Dieter Hayn and
                  Bernhard Pfeifer and
                  G{\"{u}}nter Schreier and
                  Martin Baumgartner},
  title        = {Should We Better Stick to Pen and Paper? An Empirical Investigation
                  on Functionality, Privacy and Data-Security of Physiotherapy Telehealth
                  Applications},
  booktitle    = {dHealth 2024 - Proceedings of the 18th Health Informatics Meets Digital
                  Health Conference, Vienna, Austria, May 7-8, 2024},
  series       = {Studies in Health Technology and Informatics},
  volume       = {313},
  pages        = {93--100},
  publisher    = {{IOS} Press},
  year         = {2024},
  url          = {https://doi.org/10.3233/SHTI240018},
  doi          = {10.3233/SHTI240018},
  timestamp    = {Thu, 16 May 2024 14:30:22 +0200},
  biburl       = {https://dblp.org/rec/conf/ehealth2/MaulKRW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlagicBKMS24,
  author       = {Gorjan Alagic and
                  Chen Bai and
                  Jonathan Katz and
                  Christian Majenz and
                  Patrick Struck},
  editor       = {Marc Joye and
                  Gregor Leander},
  title        = {Post-quantum Security of Tweakable Even-Mansour, and Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14651},
  pages        = {310--338},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-58716-0\_11},
  doi          = {10.1007/978-3-031-58716-0\_11},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AlagicBKMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Schage24,
  author       = {Sven Sch{\"{a}}ge},
  editor       = {Marc Joye and
                  Gregor Leander},
  title        = {New Limits of Provable Security and Applications to ElGamal Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14654},
  pages        = {255--285},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-58737-5\_10},
  doi          = {10.1007/978-3-031-58737-5\_10},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Schage24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/KimKP24,
  author       = {Sumin Kim and
                  Minsek Ko and
                  Chinju Paul},
  editor       = {Tung X. Bui},
  title        = {The Application of Rhetorical Theory in Designing Effective Information
                  Security Messages for Different Leadership Styles},
  booktitle    = {57th Hawaii International Conference on System Sciences, {HICSS} 2024,
                  Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January
                  3-6, 2024},
  pages        = {4794--4803},
  publisher    = {ScholarSpace},
  year         = {2024},
  url          = {https://hdl.handle.net/10125/106959},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/KimKP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icact/WongsunaN24,
  author       = {Vatcharavaree Wongsuna and
                  Sudsanguan Ngamsuriyaroj},
  title        = {Security Analysis of Android Applications for Hotel and Flight Booking
                  Applications},
  booktitle    = {26th International Conference on Advanced Communications Technology,
                  {ICACT} 2024, Pyeong Chang, Republic of Korea, February 4-7, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.23919/ICACT60172.2024.10472010},
  doi          = {10.23919/ICACT60172.2024.10472010},
  timestamp    = {Wed, 10 Apr 2024 17:19:24 +0200},
  biburl       = {https://dblp.org/rec/conf/icact/WongsunaN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ShahSS24a,
  author       = {Trishla Shah and
                  Raghav V. Sampangi and
                  Angela A. Siegel},
  title        = {Mobile Application Security Risk Score: {A} sensitive user input-based
                  approach},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433828},
  doi          = {10.1109/ICAIC60265.2024.10433828},
  timestamp    = {Tue, 05 Mar 2024 21:04:39 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ShahSS24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/GuoDLZXH24,
  author       = {Hanyang Guo and
                  Hong{-}Ning Dai and
                  Xiapu Luo and
                  Zibin Zheng and
                  Gengyang Xu and
                  Fengliang He},
  title        = {An Empirical Study on Oculus Virtual Reality Applications: Security
                  and Privacy Perspectives},
  booktitle    = {Proceedings of the 46th {IEEE/ACM} International Conference on Software
                  Engineering, {ICSE} 2024, Lisbon, Portugal, April 14-20, 2024},
  pages        = {159:1--159:13},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3597503.3639082},
  doi          = {10.1145/3597503.3639082},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/GuoDLZXH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsid/MekaMV24,
  author       = {Juneet Kumar Meka and
                  Satya AmarKant Marupureddy and
                  Ranga Vemuri},
  title        = {Pattern Based Synthetic Benchmark Generation for Hardware Security
                  Applications},
  booktitle    = {37th International Conference on {VLSI} Design and 23rd International
                  Conference on Embedded Systems, {VLSID} 2024, Kolkata, India, January
                  6-10, 2024},
  pages        = {461--466},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/VLSID60093.2024.00083},
  doi          = {10.1109/VLSID60093.2024.00083},
  timestamp    = {Mon, 08 Apr 2024 20:48:39 +0200},
  biburl       = {https://dblp.org/rec/conf/vlsid/MekaMV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/PolinskyD0E24,
  author       = {Isaac Polinsky and
                  Pubali Datta and
                  Adam Bates and
                  William Enck},
  editor       = {Tat{-}Seng Chua and
                  Chong{-}Wah Ngo and
                  Ravi Kumar and
                  Hady W. Lauw and
                  Roy Ka{-}Wei Lee},
  title        = {{GRASP:} Hardening Serverless Applications through Graph Reachability
                  Analysis of Security Policies},
  booktitle    = {Proceedings of the {ACM} on Web Conference 2024, {WWW} 2024, Singapore,
                  May 13-17, 2024},
  pages        = {1644--1655},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3589334.3645436},
  doi          = {10.1145/3589334.3645436},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/PolinskyD0E24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/24/JavedQ24,
  author       = {Ibrahim Tariq Javed and
                  Kashif Naseer Qureshi},
  editor       = {Kashif Naseer Qureshi and
                  Thomas Newe and
                  Gwanggil Jeon and
                  Abdellah Chehri},
  title        = {Role of Blockchain for IoE Infrastructures and Applications},
  booktitle    = {Cybersecurity Vigilance and Security Engineering of Internet of Everything
                  - Technology, Communications and Computing},
  pages        = {127--139},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-45162-1\_8},
  doi          = {10.1007/978-3-031-45162-1\_8},
  timestamp    = {Thu, 04 Jan 2024 17:09:15 +0100},
  biburl       = {https://dblp.org/rec/books/sp/24/JavedQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cesar/2023,
  editor       = {Gurvan Le Guernic},
  title        = {Proceedings of the 30th Computer {\&} Electronics Security Application
                  Rendezvous Conference (C{\&}ESAR 2023) co-located with the 8th
                  European Cyber Week {(ECW} 2023), Rennes, France, November 21-22,
                  2023},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3610},
  publisher    = {CEUR-WS.org},
  year         = {2024},
  url          = {https://ceur-ws.org/Vol-3610},
  urn          = {urn:nbn:de:0074-3610-9},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cesar/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisa/2023,
  editor       = {Jun Shao and
                  Sokratis K. Katsikas and
                  Weizhi Meng},
  title        = {Emerging Information Security and Applications - 4th International
                  Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {2004},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-99-9614-8},
  doi          = {10.1007/978-981-99-9614-8},
  isbn         = {978-981-99-9613-1},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2023,
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-99-8024-6},
  doi          = {10.1007/978-981-99-8024-6},
  isbn         = {978-981-99-8023-9},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-11126,
  author       = {Hangsheng Zhang and
                  Jiqiang Liu and
                  Jinsong Dong},
  title        = {{CARE:} Ensemble Adversarial Robustness Evaluation Against Adaptive
                  Attackers for Security Applications},
  journal      = {CoRR},
  volume       = {abs/2401.11126},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.11126},
  doi          = {10.48550/ARXIV.2401.11126},
  eprinttype    = {arXiv},
  eprint       = {2401.11126},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-11126.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-12358,
  author       = {Elena Baninemeh and
                  Slinger Jansen and
                  Katsiaryna Labunets},
  title        = {A Security Risk Assessment Method for Distributed Ledger Technology
                  {(DLT)} based Applications: Three Industry Case Studies},
  journal      = {CoRR},
  volume       = {abs/2401.12358},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.12358},
  doi          = {10.48550/ARXIV.2401.12358},
  eprinttype    = {arXiv},
  eprint       = {2401.12358},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-12358.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-03591,
  author       = {Tiago M. Fern{\'{a}}ndez{-}Caram{\'{e}}s and
                  Paula Fraga{-}Lamas and
                  Manuel Su{\'{a}}rez{-}Albela and
                  Luis Castedo},
  title        = {Reverse Engineering and Security Evaluation of Commercial Tags for
                  RFID-Based IoT Applications},
  journal      = {CoRR},
  volume       = {abs/2402.03591},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.03591},
  doi          = {10.48550/ARXIV.2402.03591},
  eprinttype    = {arXiv},
  eprint       = {2402.03591},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-03591.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-13815,
  author       = {Hanyang Guo and
                  Hong{-}Ning Dai and
                  Xiapu Luo and
                  Zibin Zheng and
                  Gengyang Xu and
                  Fengliang He},
  title        = {An Empirical Study on Oculus Virtual Reality Applications: Security
                  and Privacy Perspectives},
  journal      = {CoRR},
  volume       = {abs/2402.13815},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.13815},
  doi          = {10.48550/ARXIV.2402.13815},
  eprinttype    = {arXiv},
  eprint       = {2402.13815},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-13815.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-09219,
  author       = {Matteo Esposito and
                  Valentina Falaschi and
                  Davide Falessi},
  title        = {An Extensive Comparison of Static Application Security Testing Tools},
  journal      = {CoRR},
  volume       = {abs/2403.09219},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.09219},
  doi          = {10.48550/ARXIV.2403.09219},
  eprinttype    = {arXiv},
  eprint       = {2403.09219},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-09219.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-16304,
  author       = {Omar Alrawi and
                  Miuyin Yong Wong and
                  Athanasios Avgetidis and
                  Kevin Valakuzhy and
                  Boladji Vinny Adjibi and
                  Konstantinos Karakatsanis and
                  Mustaque Ahamad and
                  Douglas M. Blough and
                  Fabian Monrose and
                  Manos Antonakakis},
  title        = {SoK: An Essential Guide For Using Malware Sandboxes In Security Applications:
                  Challenges, Pitfalls, and Lessons Learned},
  journal      = {CoRR},
  volume       = {abs/2403.16304},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.16304},
  doi          = {10.48550/ARXIV.2403.16304},
  eprinttype    = {arXiv},
  eprint       = {2403.16304},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-16304.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-17787,
  author       = {Fouad Trad and
                  Ali Chehab},
  title        = {Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models
                  Versus Fine-Tuned Vision Transformers in Image-Based Security Applications},
  journal      = {CoRR},
  volume       = {abs/2403.17787},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.17787},
  doi          = {10.48550/ARXIV.2403.17787},
  eprinttype    = {arXiv},
  eprint       = {2403.17787},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-17787.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-11388,
  author       = {Akinsola Ahmed and
                  Ejiofor Oluomachi and
                  Akinde Abdullah and
                  Njoku Tochukwu},
  title        = {Enhancing Data Privacy In Wireless Sensor Networks: Investigating
                  Techniques And Protocols To Protect Privacy Of Data Transmitted Over
                  Wireless Sensor Networks In Critical Applications Of Healthcare And
                  National Security},
  journal      = {CoRR},
  volume       = {abs/2404.11388},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.11388},
  doi          = {10.48550/ARXIV.2404.11388},
  eprinttype    = {arXiv},
  eprint       = {2404.11388},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-11388.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-17955,
  author       = {Jia Zeng and
                  Dan Han and
                  Yaling Zhu and
                  Yangzhong Wang and
                  Fangchen Weng},
  title        = {A Survey of Third-Party Library Security Research in Application Software},
  journal      = {CoRR},
  volume       = {abs/2404.17955},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.17955},
  doi          = {10.48550/ARXIV.2404.17955},
  eprinttype    = {arXiv},
  eprint       = {2404.17955},
  timestamp    = {Mon, 27 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-17955.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-18186,
  author       = {Kaixuan Li and
                  Yue Xue and
                  Sen Chen and
                  Han Liu and
                  Kairan Sun and
                  Ming Hu and
                  Haijun Wang and
                  Yang Liu and
                  Yixiang Chen},
  title        = {Static Application Security Testing {(SAST)} Tools for Smart Contracts:
                  How Far Are We?},
  journal      = {CoRR},
  volume       = {abs/2404.18186},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.18186},
  doi          = {10.48550/ARXIV.2404.18186},
  eprinttype    = {arXiv},
  eprint       = {2404.18186},
  timestamp    = {Mon, 27 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-18186.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Spell23,
  author       = {Gregory Spell},
  title        = {Deep Learning for Applications in Inverse Modeling, Legislator Analysis,
                  and Computer Vision for Security},
  school       = {Duke University, Durham, NC, {USA}},
  year         = {2023},
  url          = {https://hdl.handle.net/10161/27647},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Spell23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Tawose23,
  author       = {Olamide Timothy Tawose},
  title        = {Harnessing the Power of Distributed Computing: Advancements in Scientific
                  Applications, Homomorphic Encryption, and Federated Learning Security},
  school       = {University of Nevada, Reno, {USA}},
  year         = {2023},
  url          = {http://hdl.handle.net/11714/10520},
  timestamp    = {Sun, 29 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Tawose23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Frey23,
  author       = {Matthias Frey},
  title        = {Distributed function approximation over noisy channels: with reliability
                  and security guarantees for applications in wireless networks},
  school       = {Technical University of Berlin, Germany},
  year         = {2023},
  url          = {https://d-nb.info/127907745X},
  urn          = {urn:nbn:de:101:1-2023012500591671650836},
  timestamp    = {Thu, 20 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Frey23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Mues23,
  author       = {Malte Mues},
  title        = {The integration of multi-color taint-analysis with dynamic symbolic
                  execution for Java web application security analysis},
  school       = {Technical University of Dortmund, Germany},
  year         = {2023},
  url          = {http://hdl.handle.net/2003/41851},
  urn          = {urn:nbn:de:101:1-2023063012441907332002},
  doi          = {10.17877/DE290R-23694},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/dnb/Mues23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/sg/Liu23,
  author       = {Ye Liu},
  title        = {On security and reliability of smart contracts: the applications of
                  dynamic specification mining on solidity},
  school       = {Nanyang Technological University, Singapore},
  year         = {2023},
  url          = {https://doi.org/10.32657/10356/168560},
  doi          = {10.32657/10356/168560},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/sg/Liu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/tr/Ozogur23,
  author       = {Gokhan Ozogur},
  title        = {Makine {\"{o}}{\u{g}}renmesi yakla{\c{s}}{\i}m{\i} ile android
                  uygulamalar{\i}n{\i}n g{\"{u}}venlik analizi (Security analysis
                  of android applications with machine learning approach)},
  school       = {{\.{I}}stanbul University-Cerrahpa{\c{s}}a, Turkey},
  year         = {2023},
  url          = {https://tez.yok.gov.tr/UlusalTezMerkezi/tezDetay.jsp?id=e0-mwM4YzBrbNY2zMMJkoA\&no=D4KsoZm9Lv4k3ZMnqLqyGw},
  timestamp    = {Sun, 03 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/tr/Ozogur23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/Moller23,
  author       = {Dietmar P. F. M{\"{o}}ller},
  title        = {Guide to Cybersecurity in Digital Transformation - Trends, Methods,
                  Technologies, Applications and Best Practices},
  series       = {Advances in Information Security},
  volume       = {103},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-26845-8},
  doi          = {10.1007/978-3-031-26845-8},
  isbn         = {978-3-031-26844-1},
  timestamp    = {Sun, 14 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Moller23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlGhailiGJAAIBKHOKR23,
  author       = {Abbas M. Al{-}Ghaili and
                  Saraswathy Shamini Gunasekaran and
                  Norziana Jamil and
                  Zaid Abdi Alkareem Alyasseri and
                  Naif Mohammed Al{-}Hada and
                  Zul{-}Azri Bin Ibrahim and
                  Asmidar Abu Bakar and
                  Hairoladenan Kasim and
                  Eghbal Hosseini and
                  Ridha Omar and
                  Rafiziana Md. Kasmani and
                  Rina Azlin Razali},
  title        = {A Review on Role of Image Processing Techniques to Enhancing Security
                  of IoT Applications},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {101924--101948},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3312682},
  doi          = {10.1109/ACCESS.2023.3312682},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AlGhailiGJAAIBKHOKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BurhanAARAFA23,
  author       = {Muhammad Burhan and
                  Hina Alam and
                  Ahmad Arsalan and
                  Rana Asif Rehman and
                  Muhammad Anwar and
                  Muhammad Faheem and
                  Muhammad Waqar Ashraf},
  title        = {A Comprehensive Survey on the Cooperation of Fog Computing Paradigm-Based
                  IoT Applications: Layered Architecture, Real-Time Security Issues,
                  and Solutions},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {73303--73329},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3294479},
  doi          = {10.1109/ACCESS.2023.3294479},
  timestamp    = {Fri, 28 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BurhanAARAFA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/EkolleOK23,
  author       = {Zie Eya Ekolle and
                  Hideki Ochiai and
                  Ryuji Kohno},
  title        = {Collabo: {A} Collaborative Machine Learning Model and Its Application
                  to the Security of Heterogeneous Medical Data in an IoT Network},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {142663--142675},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3341837},
  doi          = {10.1109/ACCESS.2023.3341837},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/EkolleOK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GabaKAJBKSSAA23,
  author       = {Shivani Gaba and
                  Haneef Khan and
                  Khalid J. Almalki and
                  Abdoh M. A. Jabbari and
                  Ishan Budhiraja and
                  Vimal Kumar and
                  Akansha Singh and
                  Krishna Kant Singh and
                  Sameh S. Askar and
                  Mohamed Abouhawwash},
  title        = {Holochain: An Agent-Centric Distributed Hash Table Security in Smart
                  IoT Applications},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {81205--81223},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3300220},
  doi          = {10.1109/ACCESS.2023.3300220},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GabaKAJBKSSAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MehrzadDMSA23,
  author       = {Alireza Mehrzad and
                  Milad Darmiani and
                  Yashar Mousavi and
                  Miadreza Shafie{-}Khah and
                  Mohammad Reza Aghamohammadi},
  title        = {A Review on Data-Driven Security Assessment of Power Systems: Trends
                  and Applications of Artificial Intelligence},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {78671--78685},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3299208},
  doi          = {10.1109/ACCESS.2023.3299208},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MehrzadDMSA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RafieiRI23,
  author       = {Mehdi Rafiei and
                  Jenni Raitoharju and
                  Alexandros Iosifidis},
  title        = {Computer Vision on X-Ray Data in Industrial Production and Security
                  Applications: {A} Comprehensive Survey},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {2445--2477},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3234187},
  doi          = {10.1109/ACCESS.2023.3234187},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RafieiRI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZookerWFK23,
  author       = {David Zooker and
                  Yoav Weizman and
                  Alexander Fish and
                  Osnat Keren},
  title        = {Silicon Proven 1.29 {\(\mu\)}m {\texttimes} 1.8 {\(\mu\)}m 65nm Sub-Vt
                  Optical Sensor for Hardware Security Applications},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {136269--136278},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3338001},
  doi          = {10.1109/ACCESS.2023.3338001},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZookerWFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/air/YadavKS23,
  author       = {Ashok Yadav and
                  Atul Kumar and
                  Vrijendra Singh},
  title        = {Open-source intelligence: a comprehensive review of the current state,
                  applications and future perspectives in cyber security},
  journal      = {Artif. Intell. Rev.},
  volume       = {56},
  number       = {11},
  pages        = {12407--12438},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10462-023-10454-y},
  doi          = {10.1007/S10462-023-10454-Y},
  timestamp    = {Mon, 02 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/air/YadavKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/array/YaoLLJXL23,
  author       = {Aiting Yao and
                  Gang Li and
                  Xuejun Li and
                  Frank Jiang and
                  Jia Xu and
                  Xiao Liu},
  title        = {Differential privacy in edge computing-based smart city Applications:Security
                  issues, solutions and future directions},
  journal      = {Array},
  volume       = {19},
  pages        = {100293},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.array.2023.100293},
  doi          = {10.1016/J.ARRAY.2023.100293},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/array/YaoLLJXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cejcs/ZhangJJH23,
  author       = {Yajuan Zhang and
                  Ru Jing and
                  Xiang Ji and
                  Nan Hu},
  title        = {Application of wireless sensor network technology based on artificial
                  intelligence in security monitoring system},
  journal      = {Open Comput. Sci.},
  volume       = {13},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1515/comp-2022-0280},
  doi          = {10.1515/COMP-2022-0280},
  timestamp    = {Mon, 16 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cejcs/ZhangJJH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cleiej/SyamsuddinDA23,
  author       = {Irfan Syamsuddin and
                  Alimin Daude and
                  David Al{-}Dabass},
  title        = {The Application of Ternary {AHP} in Adopting Security Certifications
                  into Vocational Cyber Security Course},
  journal      = {{CLEI} Electron. J.},
  volume       = {26},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.19153/cleiej.26.2.8},
  doi          = {10.19153/CLEIEJ.26.2.8},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cleiej/SyamsuddinDA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cogcom/FaundezZanuyM23,
  author       = {Marcos Fa{\'{u}}ndez{-}Zanuy and
                  Jir{\'{\i}} Mekyska},
  title        = {Analysis of Gender Differences in Online Handwriting Signals for Enhancing
                  e-Health and e-Security Applications},
  journal      = {Cogn. Comput.},
  volume       = {15},
  number       = {1},
  pages        = {208--219},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12559-023-10116-9},
  doi          = {10.1007/S12559-023-10116-9},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cogcom/FaundezZanuyM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/CoelhoNVSN23,
  author       = {Kristtopher Kayo Coelho and
                  Michele Nogueira and
                  Alex Borges Vieira and
                  Edelberto F. Silva and
                  Jos{\'{e}} Augusto Miranda Nacif},
  title        = {A survey on federated learning for security and privacy in healthcare
                  applications},
  journal      = {Comput. Commun.},
  volume       = {207},
  pages        = {113--127},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comcom.2023.05.012},
  doi          = {10.1016/J.COMCOM.2023.05.012},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/CoelhoNVSN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/XuLY23,
  author       = {Feihong Xu and
                  Shubo Liu and
                  Xu Yang},
  title        = {An efficient privacy-preserving authentication scheme with enhanced
                  security for IoMT applications},
  journal      = {Comput. Commun.},
  volume       = {208},
  pages        = {171--178},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comcom.2023.06.012},
  doi          = {10.1016/J.COMCOM.2023.06.012},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/XuLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiCAGPZ23,
  author       = {Jingjin Li and
                  Chao Chen and
                  Mostafa Rahimi Azghadi and
                  Hossein Ghodosi and
                  Lei Pan and
                  Jun Zhang},
  title        = {Security and privacy problems in voice assistant applications: {A}
                  survey},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103448},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103448},
  doi          = {10.1016/J.COSE.2023.103448},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiCAGPZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WenK23,
  author       = {Shao{-}Fang Wen and
                  Basel Katt},
  title        = {A quantitative security evaluation and analysis model for web applications
                  based on {OWASP} application security verification standard},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103532},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103532},
  doi          = {10.1016/J.COSE.2023.103532},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WenK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/AbdulghaffarEY23,
  author       = {Khaled Abdulghaffar and
                  Nebrase Elmrabit and
                  Mehdi Yousefi},
  title        = {Enhancing Web Application Security through Automated Penetration Testing
                  with Multiple Vulnerability Scanners},
  journal      = {Comput.},
  volume       = {12},
  number       = {11},
  pages        = {235},
  year         = {2023},
  url          = {https://doi.org/10.3390/computers12110235},
  doi          = {10.3390/COMPUTERS12110235},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computers/AbdulghaffarEY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/Nedyalkov23a,
  author       = {Ivan Nedyalkov},
  title        = {Application of {GNS3} to Study the Security of Data Exchange between
                  Power Electronic Devices and Control Center},
  journal      = {Comput.},
  volume       = {12},
  number       = {5},
  pages        = {101},
  year         = {2023},
  url          = {https://doi.org/10.3390/computers12050101},
  doi          = {10.3390/COMPUTERS12050101},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computers/Nedyalkov23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/RamaiahCR23,
  author       = {Mangayarkarasi Ramaiah and
                  Vanmathi Chandrasekaran and
                  Vinayakumar Ravi},
  title        = {A robust malware traffic classifier to combat security breaches in
                  industry 4.0 applications},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {35},
  number       = {23},
  year         = {2023},
  url          = {https://doi.org/10.1002/cpe.7772},
  doi          = {10.1002/CPE.7772},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/RamaiahCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csr/VermaCA23,
  author       = {Himanshu Verma and
                  Naveen Chauhan and
                  Lalit Kumar Awasthi},
  title        = {A Comprehensive review of '\emph{Internet of Healthcare Things}':
                  Networking aspects, technologies, services, applications, challenges,
                  and security concerns},
  journal      = {Comput. Sci. Rev.},
  volume       = {50},
  pages        = {100591},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cosrev.2023.100591},
  doi          = {10.1016/J.COSREV.2023.100591},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csr/VermaCA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/ShafaiKEEA23,
  author       = {Walid El Shafai and
                  Fatma Khallaf and
                  El{-}Sayed M. El{-}Rabaie and
                  Fathi E. Abd El{-}Samie and
                  Iman M. Almomani},
  title        = {A Multi-Stage Security Solution for Medical Color Images in Healthcare
                  Applications},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {46},
  number       = {3},
  pages        = {3599--3618},
  year         = {2023},
  url          = {https://doi.org/10.32604/csse.2023.037655},
  doi          = {10.32604/CSSE.2023.037655},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csse/ShafaiKEEA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/YangLLHJLS23,
  author       = {Aimin Yang and
                  Chaomeng Lu and
                  Jie Li and
                  Xiangdong Huang and
                  Tianhao Ji and
                  Xichang Li and
                  Yichao Sheng},
  title        = {Application of meta-learning in cyberspace security: a survey},
  journal      = {Digit. Commun. Networks},
  volume       = {9},
  number       = {1},
  pages        = {67--78},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dcan.2022.03.007},
  doi          = {10.1016/J.DCAN.2022.03.007},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcan/YangLLHJLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/YangMZHHZHW23,
  author       = {Aimin Yang and
                  Zezhong Ma and
                  Chunying Zhang and
                  Yang Han and
                  Zhibin Hu and
                  Wei Zhang and
                  Xiangdong Huang and
                  Yafeng Wu},
  title        = {Review on application progress of federated learning model and security
                  hazard protection},
  journal      = {Digit. Commun. Networks},
  volume       = {9},
  number       = {1},
  pages        = {146--158},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dcan.2022.11.006},
  doi          = {10.1016/J.DCAN.2022.11.006},
  timestamp    = {Mon, 20 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcan/YangMZHHZHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eis/LinXHZ23,
  author       = {Wenjun Lin and
                  Ming Xu and
                  Jingyi He and
                  Wen{-}Jun Zhang},
  title        = {Privacy, security and resilience in mobile healthcare applications},
  journal      = {Enterp. Inf. Syst.},
  volume       = {17},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1080/17517575.2021.1939896},
  doi          = {10.1080/17517575.2021.1939896},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eis/LinXHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/KangLWML23,
  author       = {Hongzhaoning Kang and
                  Gang Liu and
                  Quan Wang and
                  Lei Meng and
                  Jing Liu},
  title        = {Theory and Application of Zero Trust Security: {A} Brief Survey},
  journal      = {Entropy},
  volume       = {25},
  number       = {12},
  pages        = {1595},
  year         = {2023},
  url          = {https://doi.org/10.3390/e25121595},
  doi          = {10.3390/E25121595},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/KangLWML23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/es/SunHL23,
  author       = {Jingyun Sun and
                  Shaobin Huang and
                  Rongsheng Li},
  title        = {An unsupervised policy relevance scoring method: Taking Chinese social
                  security policies as the application case},
  journal      = {Expert Syst. J. Knowl. Eng.},
  volume       = {40},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1111/exsy.13149},
  doi          = {10.1111/EXSY.13149},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/es/SunHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/AbasDT23,
  author       = {Sherhan Upahm Abas and
                  Fecir Duran and
                  Adem Tekerek},
  title        = {A Raspberry Pi based blockchain application on IoT security},
  journal      = {Expert Syst. Appl.},
  volume       = {229},
  number       = {Part {A}},
  pages        = {120486},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.eswa.2023.120486},
  doi          = {10.1016/J.ESWA.2023.120486},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/AbasDT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/BihariSK23,
  author       = {Rakhi Bihari and
                  Jeevaraj Selvaraj and
                  Ajay Kumar},
  title        = {Geometric approach for ranking generalized trapezoidal fuzzy numbers
                  and its application in selecting security guard service company},
  journal      = {Expert Syst. Appl.},
  volume       = {234},
  pages        = {121052},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.eswa.2023.121052},
  doi          = {10.1016/J.ESWA.2023.121052},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/BihariSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/MingHZ23,
  author       = {Hao Ming and
                  Hanping Hu and
                  Jun Zheng},
  title        = {Design and application of a structure-varying coupled chaotic system
                  with high security},
  journal      = {Expert Syst. Appl.},
  volume       = {226},
  pages        = {120158},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.eswa.2023.120158},
  doi          = {10.1016/J.ESWA.2023.120158},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/MingHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiLWYMZH23,
  author       = {Hao Li and
                  Chengcheng Li and
                  Jian Wang and
                  Aimin Yang and
                  Zezhong Ma and
                  Zunqian Zhang and
                  Dianbo Hua},
  title        = {Review on security of federated learning and its application in healthcare},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {144},
  pages        = {271--290},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.future.2023.02.021},
  doi          = {10.1016/J.FUTURE.2023.02.021},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiLWYMZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/RahmanHKIDBK23,
  author       = {Anichur Rahman and
                  Kamrul Hasan and
                  Dipanjali Kundu and
                  Md. Jahidul Islam and
                  Tanoy Debnath and
                  Shahab S. Band and
                  Neeraj Kumar},
  title        = {On the ICN-IoT with federated learning integration of communication:
                  Concepts, security-privacy issues, applications, and future perspectives},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {138},
  pages        = {61--88},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.future.2022.08.004},
  doi          = {10.1016/J.FUTURE.2022.08.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/RahmanHKIDBK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/YangBXLL23,
  author       = {Aimin Yang and
                  Yunjie Bai and
                  Tao Xue and
                  Yifan Li and
                  Jie Li},
  title        = {A novel image steganography algorithm based on hybrid machine leaning
                  and its application in cyberspace security},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {145},
  pages        = {293--302},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.future.2023.03.035},
  doi          = {10.1016/J.FUTURE.2023.03.035},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/YangBXLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/PoletoNCFOF23,
  author       = {Thiago Poleto and
                  Thyago Celso Cavalcante Nepomuceno and
                  Victor Diogho Heuer de Carvalho and
                  Ligiane Cristina Braga de Oliveira Friaes and
                  Rodrigo Cleiton Paiva de Oliveira and
                  Ciro Jos{\'{e}} Jardim de Figueiredo},
  title        = {Information Security Applications in Smart Cities: {A} Bibliometric
                  Analysis of Emerging Research},
  journal      = {Future Internet},
  volume       = {15},
  number       = {12},
  pages        = {393},
  year         = {2023},
  url          = {https://doi.org/10.3390/fi15120393},
  doi          = {10.3390/FI15120393},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/PoletoNCFOF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/SzaboB23,
  author       = {Zolt{\'{a}}n Szab{\'{o}} and
                  Vilmos Bilicki},
  title        = {A New Approach to Web Application Security: Utilizing {GPT} Language
                  Models for Source Code Inspection},
  journal      = {Future Internet},
  volume       = {15},
  number       = {10},
  pages        = {326},
  year         = {2023},
  url          = {https://doi.org/10.3390/fi15100326},
  doi          = {10.3390/FI15100326},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/SzaboB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/UtomoRHH23,
  author       = {Sapdo Utomo and
                  Adarsh Rouniyar and
                  Hsiu{-}Chun Hsu and
                  Pao{-}Ann Hsiung},
  title        = {Federated Adversarial Training Strategies for Achieving Privacy and
                  Security in Sustainable Smart City Applications},
  journal      = {Future Internet},
  volume       = {15},
  number       = {11},
  pages        = {371},
  year         = {2023},
  url          = {https://doi.org/10.3390/fi15110371},
  doi          = {10.3390/FI15110371},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/UtomoRHH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/grid/RajuRSL23,
  author       = {K. Raju and
                  N. Ramshankar and
                  J. Anvar Shathik and
                  R. Lavanya},
  title        = {Blockchain Assisted Cloud Security and Privacy Preservation using
                  Hybridized Encryption and Deep Learning Mechanism in IoT-Healthcare
                  Application},
  journal      = {J. Grid Comput.},
  volume       = {21},
  number       = {3},
  pages        = {45},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10723-023-09678-7},
  doi          = {10.1007/S10723-023-09678-7},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/grid/RajuRSL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/grid/Yi23,
  author       = {Haibo Yi},
  title        = {Machine Learning Method with Applications in Hardware Security of
                  Post-Quantum Cryptography},
  journal      = {J. Grid Comput.},
  volume       = {21},
  number       = {2},
  pages        = {19},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10723-023-09643-4},
  doi          = {10.1007/S10723-023-09643-4},
  timestamp    = {Wed, 12 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/grid/Yi23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KrishnanCLBK23,
  author       = {Padmanabhan Krishnan and
                  Cristina Cifuentes and
                  Li Li and
                  Tegawend{\'{e}} F. Bissyand{\'{e}} and
                  Jacques Klein},
  title        = {Why Is Static Application Security Testing Hard to Learn?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {5},
  pages        = {68--72},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3287206},
  doi          = {10.1109/MSEC.2023.3287206},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KrishnanCLBK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-blc/WangSDWZ23,
  author       = {Liangmin Wang and
                  Victor S. Sheng and
                  Boris D{\"{u}}dder and
                  Haiqin Wu and
                  Huijuan Zhu},
  title        = {Security and privacy issues in blockchain and its applications},
  journal      = {{IET} Blockchain},
  volume       = {3},
  number       = {4},
  pages        = {169--171},
  year         = {2023},
  url          = {https://doi.org/10.1049/blc2.12051},
  doi          = {10.1049/BLC2.12051},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-blc/WangSDWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/Zhou23,
  author       = {Guangping Zhou},
  title        = {Security technology for data transmission to the internet of things
                  devices under the application of blockchain technology},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {14},
  number       = {2/3},
  pages        = {122--135},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJGUC.2023.10056297},
  doi          = {10.1504/IJGUC.2023.10056297},
  timestamp    = {Wed, 31 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/Zhou23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SalankarAP23,
  author       = {Pritam S. Salankar and
                  Vinay Avasthi and
                  Ashutosh Pasricha},
  title        = {Lightweight authentication scheme based on modified {EAP} security
                  for CoAP protocol-based IoMT applications},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {1/2},
  pages        = {176--198},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2022.10044087},
  doi          = {10.1504/IJICS.2022.10044087},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SalankarAP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AlidoostiNN23,
  author       = {Mitra Alidoosti and
                  Alireza Nowroozi and
                  Ahmad Nickabadi},
  title        = {Business-layer client-side racer: dynamic security testing of the
                  web application against client-side race condition in the business
                  layer},
  journal      = {Int. J. Inf. Sec.},
  volume       = {22},
  number       = {4},
  pages        = {1029--1054},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10207-023-00671-5},
  doi          = {10.1007/S10207-023-00671-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AlidoostiNN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LovrencicS23,
  author       = {Rudolf Lovrencic and
                  Dejan Skvorc},
  title        = {Multi-cloud applications: data and code fragmentation for improved
                  security},
  journal      = {Int. J. Inf. Sec.},
  volume       = {22},
  number       = {3},
  pages        = {713--721},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10207-022-00658-8},
  doi          = {10.1007/S10207-022-00658-8},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/LovrencicS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmi/OffermannRZ23,
  author       = {Julia Offermann and
                  Anna Rohowsky and
                  Martina Ziefle},
  title        = {Emotions of scepticism, trust, and security within the acceptance
                  of telemedical applications},
  journal      = {Int. J. Medical Informatics},
  volume       = {177},
  pages        = {105116},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijmedinf.2023.105116},
  doi          = {10.1016/J.IJMEDINF.2023.105116},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmi/OffermannRZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/ChuiGLANAC23,
  author       = {Kwok Tai Chui and
                  Brij B. Gupta and
                  Jiaqi Liu and
                  Varsha Arya and
                  Nadia Nedjah and
                  Ammar Almomani and
                  Priyanka Chaurasia},
  title        = {A Survey of Internet of Things and Cyber-Physical Systems: Standards,
                  Algorithms, Applications, Security, Challenges, and Future Directions},
  journal      = {Inf.},
  volume       = {14},
  number       = {7},
  pages        = {388},
  year         = {2023},
  url          = {https://doi.org/10.3390/info14070388},
  doi          = {10.3390/INFO14070388},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/ChuiGLANAC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/VuTAKGE23,
  author       = {Viet Q. Vu and
                  Minh{-}Quang Tran and
                  Mohammed Amer and
                  Mahesh Khatiwada and
                  Sherif S. M. Ghoneim and
                  Mahmoud Elsisi},
  title        = {A Practical Hybrid IoT Architecture with Deep Learning Technique for
                  Healthcare and Security Applications},
  journal      = {Inf.},
  volume       = {14},
  number       = {7},
  pages        = {379},
  year         = {2023},
  url          = {https://doi.org/10.3390/info14070379},
  doi          = {10.3390/INFO14070379},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/VuTAKGE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/NayakS23,
  author       = {Padmalaya Nayak and
                  G. Swapna},
  title        = {Security issues in IoT applications using certificateless aggregate
                  signcryption schemes: An overview},
  journal      = {Internet Things},
  volume       = {21},
  pages        = {100641},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.iot.2022.100641},
  doi          = {10.1016/J.IOT.2022.100641},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iot/NayakS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ChengM23,
  author       = {Leixiao Cheng and
                  Fei Meng},
  title        = {Certificateless Public Key Authenticated Searchable Encryption With
                  Enhanced Security Model in IIoT Applications},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {2},
  pages        = {1391--1400},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3207229},
  doi          = {10.1109/JIOT.2022.3207229},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ChengM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WenWDZQY23,
  author       = {Baodong Wen and
                  Yujue Wang and
                  Yong Ding and
                  Haibin Zheng and
                  Bo Qin and
                  Changsong Yang},
  title        = {Security and privacy protection technologies in securing blockchain
                  applications},
  journal      = {Inf. Sci.},
  volume       = {645},
  pages        = {119322},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ins.2023.119322},
  doi          = {10.1016/J.INS.2023.119322},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/WenWDZQY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isrob/MohsanOLAK23,
  author       = {Syed Agha Hassnain Mohsan and
                  Nawaf Qasem Hamood Othman and
                  Yanlong Li and
                  Mohammed H. Alsharif and
                  Muhammad Asghar Khan},
  title        = {Unmanned aerial vehicles (UAVs): practical aspects, applications,
                  open challenges, security issues, and future trends},
  journal      = {Intell. Serv. Robotics},
  volume       = {16},
  number       = {1},
  pages        = {109--137},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11370-022-00452-4},
  doi          = {10.1007/S11370-022-00452-4},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isrob/MohsanOLAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DashPSS23,
  author       = {Priyabrata Dash and
                  Fagul Pandey and
                  Monalisa Sarma and
                  Debasis Samanta},
  title        = {Efficient private key generation from iris data for privacy and security
                  applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103506},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103506},
  doi          = {10.1016/J.JISA.2023.103506},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DashPSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/AlkhabetI23,
  author       = {Mohammed Majeed Alkhabet and
                  Mahamod Ismail},
  title        = {Security algorithms for distributed storage system for E-health application
                  over wireless body area network},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {14},
  number       = {12},
  pages        = {15781--15792},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12652-020-02733-1},
  doi          = {10.1007/S12652-020-02733-1},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/AlkhabetI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/BhartiBS23,
  author       = {Vandana Bharti and
                  Bhaskar Biswas and
                  Kaushal Kumar Shukla},
  title        = {{MDO:} a novel murmuration-flight based dispersive optimization algorithm
                  and its application to image security},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {14},
  number       = {5},
  pages        = {4809--4826},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12652-023-04537-5},
  doi          = {10.1007/S12652-023-04537-5},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/BhartiBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/ChenLZHCZ23,
  author       = {Hongsong Chen and
                  Shi Lei and
                  Yiying Zhang and
                  Xintong Han and
                  Yongrui Cao and
                  Yongpeng Zhang},
  title        = {Blockchain-based internet of things security architecture and applications},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {14},
  number       = {12},
  pages        = {16703--16714},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12652-023-04675-w},
  doi          = {10.1007/S12652-023-04675-W},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/ChenLZHCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/RaoD23,
  author       = {Patruni Muralidhara Rao and
                  Bakkiam David Deebak},
  title        = {Security and privacy issues in smart cities/industries: technologies,
                  applications, and challenges},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {14},
  number       = {8},
  pages        = {10517--10553},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12652-022-03707-1},
  doi          = {10.1007/S12652-022-03707-1},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/RaoD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcmse/LiuLMJGGJ23,
  author       = {Zehui Liu and
                  Rui Li and
                  Dongjuan Ma and
                  Weizhe Jing and
                  Min Guo and
                  Weixing Gao and
                  Yun Ju},
  title        = {Research on reliable transmission and application security architecture
                  of power IoT based on energy interconnection},
  journal      = {J. Comput. Methods Sci. Eng.},
  volume       = {23},
  number       = {4},
  pages        = {2141--2152},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCM-226748},
  doi          = {10.3233/JCM-226748},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcmse/LiuLMJGGJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcmse/ZhangLL23,
  author       = {Jie Zhang and
                  Yukun Lu and
                  Sen Lin},
  title        = {The application of UAVs in marathon public security risk early warning},
  journal      = {J. Comput. Methods Sci. Eng.},
  volume       = {23},
  number       = {5},
  pages        = {2753--2764},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCM-226891},
  doi          = {10.3233/JCM-226891},
  timestamp    = {Mon, 09 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcmse/ZhangLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/WangJABKA23,
  author       = {Bo Wang and
                  Hadi Jahanshahi and
                  Burak Aricioglu and
                  Baris Boru and
                  Sezgin Ka{\c{c}}ar and
                  Naif D. Alotaibi},
  title        = {A variable-order fractional neural network: Dynamical properties,
                  data security application, and synchronization using a novel control
                  algorithm with a finite-time estimator},
  journal      = {J. Frankl. Inst.},
  volume       = {360},
  number       = {17},
  pages        = {13648--13670},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jfranklin.2022.04.036},
  doi          = {10.1016/J.JFRANKLIN.2022.04.036},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jfi/WangJABKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jgim/WangXZ23,
  author       = {Yawen Wang and
                  Weixian Xue and
                  Anqi Zhang},
  title        = {Application of Big Data Technology in Enterprise Information Security
                  Management and Risk Assessment},
  journal      = {J. Glob. Inf. Manag.},
  volume       = {31},
  number       = {3},
  pages        = {1--16},
  year         = {2023},
  url          = {https://doi.org/10.4018/jgim.324465},
  doi          = {10.4018/JGIM.324465},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jgim/WangXZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/DineshSRS23,
  author       = {E. Dinesh and
                  M. Sivakumar and
                  R. Rajalakshmi and
                  P. Sivakumar},
  title        = {Trust based access control with hybrid cryptographic algorithm based
                  data security on cloud for e-learning application},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {45},
  number       = {5},
  pages        = {7563--7573},
  year         = {2023},
  url          = {https://doi.org/10.3233/jifs-224287},
  doi          = {10.3233/JIFS-224287},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/DineshSRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/GargKAM23,
  author       = {Harish Garg and
                  Cengiz Kahraman and
                  Zeeshan Ali and
                  Tahir Mahmood},
  title        = {Interaction hamy mean operators for complex pythagorean fuzzy information
                  and their applications to security threats in computers},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {44},
  number       = {3},
  pages        = {4459--4479},
  year         = {2023},
  url          = {https://doi.org/10.3233/JIFS-220947},
  doi          = {10.3233/JIFS-220947},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/GargKAM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/NavaneethanJ23,
  author       = {M. Navaneethan and
                  S. Janakiraman},
  title        = {An optimized deep learning model to ensure data integrity and security
                  in IoT based e-commerce block chain application},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {44},
  number       = {5},
  pages        = {8697--8709},
  year         = {2023},
  url          = {https://doi.org/10.3233/JIFS-220743},
  doi          = {10.3233/JIFS-220743},
  timestamp    = {Sat, 03 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/NavaneethanJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/Qiao23,
  author       = {Wenbao Qiao},
  title        = {A novel {MADM} technique based on projection methods under q-rung
                  orthopair fuzzy setting and its application to computer network security
                  evaluation},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {45},
  number       = {1},
  pages        = {1029--1038},
  year         = {2023},
  url          = {https://doi.org/10.3233/JIFS-231351},
  doi          = {10.3233/JIFS-231351},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/Qiao23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/QahtanSZOZA23,
  author       = {Sarah Qahtan and
                  Khaironi Yatim Sharif and
                  Hazura Zulzalil and
                  Mohd Hafeez Osman and
                  A. A. Zaidan and
                  Hassan A. AlSattar},
  title        = {Review of healthcare industry 4.0 application-based blockchain in
                  terms of security and privacy development attributes: Comprehensive
                  taxonomy, open issues and challenges and recommended solution},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {209},
  pages        = {103529},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jnca.2022.103529},
  doi          = {10.1016/J.JNCA.2022.103529},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/QahtanSZOZA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocnet/CuginiSGSMCP22,
  author       = {Filippo Cugini and
                  Davide Scano and
                  Alessio Giorgetti and
                  Andrea Sgambelluri and
                  Lorenzo De Marinis and
                  Piero Castoldi and
                  Francesco Paolucci},
  title        = {Telemetry and AI-based security {P4} applications for optical networks
                  [Invited]},
  journal      = {{JOCN}},
  volume       = {15},
  number       = {1},
  pages        = {A1--A10},
  year         = {2023},
  url          = {https://doi.org/10.1364/jocn.470118},
  doi          = {10.1364/JOCN.470118},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocnet/CuginiSGSMCP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/FangLZCL23,
  author       = {Shuya Fang and
                  Qingquan Liu and
                  Fengrui Zhang and
                  Ningyan Chen and
                  Xin Li},
  title        = {Application of Internet of Things and Blockchain in Information Security
                  and Privacy Protection of Global Organizations},
  journal      = {J. Organ. End User Comput.},
  volume       = {35},
  number       = {3},
  pages        = {1--16},
  year         = {2023},
  url          = {https://doi.org/10.4018/joeuc.323192},
  doi          = {10.4018/JOEUC.323192},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joeuc/FangLZCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrie/MariottiBLMN23,
  author       = {Francesco Mariotti and
                  Andrea Bondavalli and
                  Paolo Lollini and
                  Leonardo Montecchi and
                  Simone Nardi},
  title        = {An extension of the {ADVISE} Meta modeling framework and its application
                  for an early-stage security analysis of a public transport supervision
                  system},
  journal      = {J. Reliab. Intell. Environ.},
  volume       = {9},
  number       = {3},
  pages        = {263--281},
  year         = {2023},
  url          = {https://doi.org/10.1007/s40860-023-00209-5},
  doi          = {10.1007/S40860-023-00209-5},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jrie/MariottiBLMN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/FerragMB23,
  author       = {Mohamed Amine Ferrag and
                  Leandros A. Maglaras and
                  Mohamed Benbouzid},
  title        = {Blockchain and Artificial Intelligence as Enablers of Cyber Security
                  in the Era of IoT and IIoT Applications},
  journal      = {J. Sens. Actuator Networks},
  volume       = {12},
  number       = {3},
  pages        = {40},
  year         = {2023},
  url          = {https://doi.org/10.3390/jsan12030040},
  doi          = {10.3390/JSAN12030040},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsan/FerragMB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/SchneiderS23,
  author       = {Simon Schneider and
                  Riccardo Scandariato},
  title        = {Automatic extraction of security-rich dataflow diagrams for microservice
                  applications written in Java},
  journal      = {J. Syst. Softw.},
  volume       = {202},
  pages        = {111722},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jss.2023.111722},
  doi          = {10.1016/J.JSS.2023.111722},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/SchneiderS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jstsp/XiaoDCL23,
  author       = {Yuquan Xiao and
                  Qinghe Du and
                  Wenchi Cheng and
                  Nan Lu},
  title        = {Secure Communication Guarantees for Diverse Extended-Reality Applications:
                  {A} Unified Statistical Security Model},
  journal      = {{IEEE} J. Sel. Top. Signal Process.},
  volume       = {17},
  number       = {5},
  pages        = {1007--1021},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSTSP.2023.3304117},
  doi          = {10.1109/JSTSP.2023.3304117},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jstsp/XiaoDCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/ChenWX23,
  author       = {Jie Chen and
                  Dandan Wu and
                  Ruiyun Xie},
  title        = {Artificial intelligence algorithms for cyberspace security applications:
                  a technological and status review},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {24},
  number       = {8},
  pages        = {1117--1142},
  year         = {2023},
  url          = {https://doi.org/10.1631/FITEE.2200314},
  doi          = {10.1631/FITEE.2200314},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jzusc/ChenWX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZhangXZL23,
  author       = {Yingpeng Zhang and
                  Hongyue Xiang and
                  Shijie Zhang and
                  Lingfeng Liu},
  title        = {Construction of high-dimensional cyclic symmetric chaotic map with
                  one-dimensional chaotic map and its security application},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {12},
  pages        = {17715--17740},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-022-14044-y},
  doi          = {10.1007/S11042-022-14044-Y},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ZhangXZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/NayakAPM23,
  author       = {Janmenjoy Nayak and
                  David Al{-}Dabass and
                  Danilo Pelusi and
                  Manohar Mishra},
  title        = {Special issue on machine learning for security and privacy: advancing
                  the state-of-the-art applications},
  journal      = {Neural Comput. Appl.},
  volume       = {35},
  number       = {7},
  pages        = {4809--4812},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00521-022-08183-4},
  doi          = {10.1007/S00521-022-08183-4},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/nca/NayakAPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ngc/AnbalaganRR23,
  author       = {Vivek Yoganand Anbalagan and
                  S. Rajasekaran and
                  T. D. Rajeeve},
  title        = {A Novel ORLLTMLP-Based Attack Detection and Blockchain-Aware Security
                  Framework Using {LCTFA} in Smart City Applications},
  journal      = {New Gener. Comput.},
  volume       = {41},
  number       = {2},
  pages        = {315--342},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00354-023-00210-9},
  doi          = {10.1007/S00354-023-00210-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ngc/AnbalaganRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npl/SaranyaN23,
  author       = {A. Saranya and
                  R. Naresh},
  title        = {Efficient Mobile Security for {E} Health Care Application in Cloud
                  for Secure Payment Using Key Distribution},
  journal      = {Neural Process. Lett.},
  volume       = {55},
  number       = {1},
  pages        = {141--152},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11063-021-10482-1},
  doi          = {10.1007/S11063-021-10482-1},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/npl/SaranyaN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ojcs/NaeemAKHY23,
  author       = {Faisal Naeem and
                  Mansoor Ali and
                  Georges Kaddoum and
                  Chongwen Huang and
                  Chau Yuen},
  title        = {Security and Privacy for Reconfigurable Intelligent Surface in 6G:
                  {A} Review of Prospective Applications and Challenges},
  journal      = {{IEEE} Open J. Commun. Soc.},
  volume       = {4},
  pages        = {1196--1217},
  year         = {2023},
  url          = {https://doi.org/10.1109/OJCOMS.2023.3273507},
  doi          = {10.1109/OJCOMS.2023.3273507},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ojcs/NaeemAKHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/StrunzAWKVG23,
  author       = {Kai Strunz and
                  Khaled Almunem and
                  Christoph Wulkow and
                  Maren Kuschke and
                  Marta Valescudero and
                  Xavier Guillaud},
  title        = {Enabling 100{\%} Renewable Power Systems Through Power Electronic
                  Grid-Forming Converter and Control: System Integration for Security,
                  Stability, and Application to Europe},
  journal      = {Proc. {IEEE}},
  volume       = {111},
  number       = {7},
  pages        = {891--915},
  year         = {2023},
  url          = {https://doi.org/10.1109/JPROC.2022.3193374},
  doi          = {10.1109/JPROC.2022.3193374},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/StrunzAWKVG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/SudhaJ23,
  author       = {K. Swapna Sudha and
                  N. Jeyanthi},
  title        = {Merkle hash tree improved strongly constrained discrete hashing function-based
                  authentication scheme for enabling security for smart home IoT applications},
  journal      = {Peer Peer Netw. Appl.},
  volume       = {16},
  number       = {5},
  pages        = {2367--2379},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12083-023-01527-4},
  doi          = {10.1007/S12083-023-01527-4},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/SudhaJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/quantum/CojocaruGKSW23,
  author       = {Alexandru Cojocaru and
                  Juan A. Garay and
                  Aggelos Kiayias and
                  Fang Song and
                  Petros Wallden},
  title        = {Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
                  Post-Quantum Security},
  journal      = {Quantum},
  volume       = {7},
  pages        = {944},
  year         = {2023},
  url          = {https://doi.org/10.22331/q-2023-03-09-944},
  doi          = {10.22331/Q-2023-03-09-944},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/quantum/CojocaruGKSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Yu23,
  author       = {Haiping Yu},
  title        = {Application of blockchain technology in the data processing security
                  system of financial enterprises},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.230},
  doi          = {10.1002/SPY2.230},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Yu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/0013KJM023,
  author       = {Muhammad Bilal and
                  Atif Khan and
                  Salman Jan and
                  Shahrulniza Musa and
                  Shaukat Ali},
  title        = {Roman Urdu Hate Speech Detection Using Transformer-Based Model for
                  Cyber Security Applications},
  journal      = {Sensors},
  volume       = {23},
  number       = {8},
  pages        = {3909},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23083909},
  doi          = {10.3390/S23083909},
  timestamp    = {Wed, 28 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/0013KJM023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/CutoloBBBBBCCCCCPEFGIIIJLLMMMPQ23,
  author       = {Antonello Cutolo and
                  Romeo Bernini and
                  Gaia Maria Berruti and
                  Giovanni Breglio and
                  Francesco Antonio Bruno and
                  Salvatore Buontempo and
                  Ester Catalano and
                  Marco Consales and
                  Agnese Coscetta and
                  Andrea Cusano and
                  Maria Alessandra Cutolo and
                  Pasquale Di Palma and
                  Flavio Esposito and
                  Francesco Fienga and
                  Michele Giordano and
                  Antonio Iele and
                  Agostino Iadicicco and
                  Andrea Irace and
                  Mohammed Janneh and
                  Armando Laudati and
                  Marco Leone and
                  Luca Maresca and
                  Vincenzo Romano Marrazzo and
                  Aldo Minardo and
                  Marco Pisco and
                  Giuseppe Quero and
                  Michele Riccio and
                  Anubhav Srivastava and
                  Patrizio Vaiano and
                  Luigi Zeni and
                  Stefania Campopiano},
  title        = {Innovative Photonic Sensors for Safety and Security, Part {II:} Aerospace
                  and Submarine Applications},
  journal      = {Sensors},
  volume       = {23},
  number       = {5},
  pages        = {2417},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23052417},
  doi          = {10.3390/S23052417},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/CutoloBBBBBCCCCCPEFGIIIJLLMMMPQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/McmurrayS23,
  author       = {Samuel Mcmurray and
                  Ali Hassan Sodhro},
  title        = {A Study on ML-Based Software Defect Detection for Security Traceability
                  in Smart Healthcare Applications},
  journal      = {Sensors},
  volume       = {23},
  number       = {7},
  pages        = {3470},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23073470},
  doi          = {10.3390/S23073470},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/McmurrayS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/MusaKAA23,
  author       = {Hussam Saeed Musa and
                  Moez Krichen and
                  Adem Alpaslan Altun and
                  Meryem Ammi},
  title        = {Survey on Blockchain-Based Data Storage Security for Android Mobile
                  Applications},
  journal      = {Sensors},
  volume       = {23},
  number       = {21},
  pages        = {8749},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23218749},
  doi          = {10.3390/S23218749},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/MusaKAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/PomenkovaM23,
  author       = {Jitka Pomenkov{\'{a}} and
                  Tobias Malach},
  title        = {Optimized Classifier Learning for Face Recognition Performance Boost
                  in Security and Surveillance Applications},
  journal      = {Sensors},
  volume       = {23},
  number       = {15},
  pages        = {7012},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23157012},
  doi          = {10.3390/S23157012},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/PomenkovaM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/KumarKM23,
  author       = {Nitesh Kumar and
                  Gaurav S. Kasbekar and
                  D. Manjunath},
  title        = {Application of Data Collected by Endpoint Detection and Response Systems
                  for Implementation of a Network Security System based on Zero Trust
                  Principles and the EigenTrust Algorithm},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {50},
  number       = {4},
  pages        = {5--7},
  year         = {2023},
  url          = {https://doi.org/10.1145/3595244.3595247},
  doi          = {10.1145/3595244.3595247},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/KumarKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/MaZWDXYZ23,
  author       = {Kui Ma and
                  Yanwei Zhou and
                  Ying Wang and
                  Chunsheng Dong and
                  Zhe Xia and
                  Bo Yang and
                  Mingwu Zhang},
  title        = {An Efficient Certificateless Signature Scheme With Provably Security
                  and Its Applications},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {4},
  pages        = {5636--5647},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2023.3269597},
  doi          = {10.1109/JSYST.2023.3269597},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/MaZWDXYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/Ahammad23,
  author       = {Ishtiaq Ahammad},
  title        = {Fog Computing Complete Review: Concepts, Trends, Architectures, Technologies,
                  Simulators, Security Issues, Applications, and Open Research Fields},
  journal      = {{SN} Comput. Sci.},
  volume       = {4},
  number       = {6},
  pages        = {765},
  year         = {2023},
  url          = {https://doi.org/10.1007/s42979-023-02235-9},
  doi          = {10.1007/S42979-023-02235-9},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sncs/Ahammad23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/RajputMTAZR23,
  author       = {Ahmed Raza Rajput and
                  Isma Masood and
                  Almas Tabassam and
                  Muhammad Shamrooz Aslam and
                  Shaoyu Zhang and
                  Mehreen Aslam Rajput},
  title        = {Patient's data privacy and security in mHealth applications: a Charles
                  proxy-based recommendation},
  journal      = {Soft Comput.},
  volume       = {27},
  number       = {23},
  pages        = {18165--18180},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00500-023-09265-8},
  doi          = {10.1007/S00500-023-09265-8},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/RajputMTAZR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/ReddyPUNR23,
  author       = {V. Padmanabha Reddy and
                  R. Murali Prasad and
                  Pamula Udayaraju and
                  Bhattu HariPrasad Naik and
                  Ch. Raja},
  title        = {Efficient medical image security and transmission using modified {LZW}
                  compression and {ECDH-AES} for telemedicine applications},
  journal      = {Soft Comput.},
  volume       = {27},
  number       = {13},
  pages        = {9151--9168},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00500-023-08499-w},
  doi          = {10.1007/S00500-023-08499-W},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/ReddyPUNR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/softx/PaganoRCVM23,
  author       = {Francesco Pagano and
                  Andrea Romdhana and
                  Davide Caputo and
                  Luca Verderame and
                  Alessio Merlo},
  title        = {SEBASTiAn: {A} static and extensible black-box application security
                  testing tool for iOS and Android applications},
  journal      = {SoftwareX},
  volume       = {23},
  pages        = {101448},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.softx.2023.101448},
  doi          = {10.1016/J.SOFTX.2023.101448},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/softx/PaganoRCVM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/KerimkhulleDTATMATZS23,
  author       = {Seyit Kerimkhulle and
                  Zhulduz Dildebayeva and
                  Akylbek Tokhmetov and
                  Akzhibek Amirova and
                  Jamalbek Tussupov and
                  Ulzhan Makhazhanova and
                  Alibek Adalbek and
                  Roman Taberkhan and
                  Alma Zakirova and
                  Alua Salykbayeva},
  title        = {Fuzzy Logic and Its Application in the Assessment of Information Security
                  Risk of Industrial Internet of Things},
  journal      = {Symmetry},
  volume       = {15},
  number       = {10},
  pages        = {1958},
  year         = {2023},
  url          = {https://doi.org/10.3390/sym15101958},
  doi          = {10.3390/SYM15101958},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/KerimkhulleDTATMATZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcps/SarieddineSTAA23,
  author       = {Khaled Sarieddine and
                  Mohammad Ali Sayed and
                  Sadegh Torabi and
                  Ribal Atallah and
                  Chadi Assi},
  title        = {Investigating the Security of {EV} Charging Mobile Applications as
                  an Attack Surface},
  journal      = {{ACM} Trans. Cyber Phys. Syst.},
  volume       = {7},
  number       = {4},
  pages        = {26:1--26:28},
  year         = {2023},
  url          = {https://doi.org/10.1145/3609508},
  doi          = {10.1145/3609508},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcps/SarieddineSTAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/ShiCSWZPK23,
  author       = {Kaibo Shi and
                  Xiao Cai and
                  Kun She and
                  Shiping Wen and
                  Shouming Zhong and
                  PooGyeon Park and
                  Oh{-}Min Kwon},
  title        = {Stability Analysis and Security-Based Event-Triggered Mechanism Design
                  for {T-S} Fuzzy {NCS} With Traffic Congestion via DoS Attack and Its
                  Application},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {31},
  number       = {10},
  pages        = {3639--3651},
  year         = {2023},
  url          = {https://doi.org/10.1109/TFUZZ.2023.3262686},
  doi          = {10.1109/TFUZZ.2023.3262686},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tfs/ShiCSWZPK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DanielBR23,
  author       = {Lesly{-}Ann Daniel and
                  S{\'{e}}bastien Bardin and
                  Tamara Rezk},
  title        = {Binsec/Rel: Symbolic Binary Analyzer for Security with Applications
                  to Constant-Time and Secret-Erasure},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {11:1--11:42},
  year         = {2023},
  url          = {https://doi.org/10.1145/3563037},
  doi          = {10.1145/3563037},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DanielBR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ScopellitiPNABPM23,
  author       = {Gianluca Scopelliti and
                  Sepideh Pouyanrad and
                  Job Noorman and
                  Fritz Alder and
                  Christoph Baumann and
                  Frank Piessens and
                  Jan Tobias M{\"{u}}hlberg},
  title        = {End-to-End Security for Distributed Event-driven Enclave Applications
                  on Heterogeneous TEEs},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {39:1--39:46},
  year         = {2023},
  url          = {https://doi.org/10.1145/3592607},
  doi          = {10.1145/3592607},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ScopellitiPNABPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/AdilJLAFS23,
  author       = {Muhammad Adil and
                  Mian Ahmad Jan and
                  Yongxin Liu and
                  Hussein Abulkasim and
                  Ahmed Farouk and
                  Houbing Song},
  title        = {A Systematic Survey: Security Threats to UAV-Aided IoT Applications,
                  Taxonomy, Current Challenges and Requirements With Future Research
                  Directions},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {2},
  pages        = {1437--1455},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2022.3220043},
  doi          = {10.1109/TITS.2022.3220043},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/AdilJLAFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/Kavousifard23,
  author       = {Abdollah Kavousifard},
  title        = {Editorial Special Issue on Application of Advanced Intelligent Methods
                  in Vehicle to Smart Grid Communications: Security, Reliability, and
                  Resiliency},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {1},
  pages        = {891--892},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2022.3230580},
  doi          = {10.1109/TITS.2022.3230580},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/Kavousifard23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/WangF23,
  title        = {Retraction Note: Application of combined kernel function artificial
                  intelligence algorithm in mobile communication network security authentication
                  mechanism},
  journal      = {J. Supercomput.},
  volume       = {79},
  number       = {5},
  pages        = {5843},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11227-022-04862-0},
  doi          = {10.1007/S11227-022-04862-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/WangF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/WazidG23,
  author       = {Mohammad Wazid and
                  Prosanta Gope},
  title        = {{BACKM-EHA:} {A} Novel Blockchain-enabled Security Solution for IoMT-based
                  E-healthcare Applications},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {23},
  number       = {3},
  pages        = {39:1--39:28},
  year         = {2023},
  url          = {https://doi.org/10.1145/3511898},
  doi          = {10.1145/3511898},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/WazidG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/WangDDY23,
  author       = {Xueli Wang and
                  Derui Ding and
                  Hongli Dong and
                  Xiao{-}jian Yi},
  title        = {PI-Based Security Control Against Joint Sensor and Controller Attacks
                  and Applications in Load Frequency Control},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Syst.},
  volume       = {53},
  number       = {2},
  pages        = {970--980},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSMC.2022.3190005},
  doi          = {10.1109/TSMC.2022.3190005},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/WangDDY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/BagchiMBDPLY23,
  author       = {Prithwi Bagchi and
                  Raj Maheshwari and
                  Basudeb Bera and
                  Ashok Kumar Das and
                  Youngho Park and
                  Pascal Lorenz and
                  David K. Y. Yau},
  title        = {Public Blockchain-Envisioned Security Scheme Using Post Quantum Lattice-Based
                  Aggregate Signature for Internet of Drones Applications},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {8},
  pages        = {10393--10408},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2023.3260579},
  doi          = {10.1109/TVT.2023.3260579},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/BagchiMBDPLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/OrlandoBPBB23,
  author       = {Danilo Orlando and
                  Stefania Bartoletti and
                  Ivan Palam{\`{a}} and
                  Giuseppe Bianchi and
                  Nicola Blefari{-}Melazzi},
  title        = {Innovative Attack Detection Solutions for Wireless Networks With Application
                  to Location Security},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {22},
  number       = {1},
  pages        = {205--219},
  year         = {2023},
  url          = {https://doi.org/10.1109/TWC.2022.3192225},
  doi          = {10.1109/TWC.2022.3192225},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/twc/OrlandoBPBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/FathimaBA23,
  author       = {Nasreen Fathima and
                  Reshma Banu and
                  G. F. Ali Ahammed},
  title        = {Integrated Signing Procedure Based Data Transfer Security and Authentication
                  Framework for Internet of Things Applications},
  journal      = {Wirel. Pers. Commun.},
  volume       = {130},
  number       = {1},
  pages        = {401--420},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11277-023-10291-w},
  doi          = {10.1007/S11277-023-10291-W},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/FathimaBA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/GaikwadA23,
  author       = {V. D. Gaikwad and
                  S. Ananthakumaran},
  title        = {A Review: Security and Privacy for Health Care Application in Wireless
                  Body Area Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {130},
  number       = {1},
  pages        = {673--691},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11277-023-10305-7},
  doi          = {10.1007/S11277-023-10305-7},
  timestamp    = {Thu, 04 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/GaikwadA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/TamilarasiJ23,
  title        = {Retraction Note: Medical Data Security for Healthcare Applications
                  Using Hybrid Lightweight Encryption and Swarm Optimization Algorithm},
  journal      = {Wirel. Pers. Commun.},
  volume       = {128},
  number       = {1},
  pages        = {733},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11277-022-10120-6},
  doi          = {10.1007/S11277-022-10120-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/TamilarasiJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acmturc/LuL23,
  author       = {Xiaozhen Lu and
                  Zhibo Liu},
  title        = {Safety Guide-Based Deep Reinforcement Learning for Network Security
                  Applications},
  booktitle    = {Proceedings of the {ACM} Turing Award Celebration Conference - China
                  2023, {ACM} {TURC} 2023, Wuhan, China, July 28-30, 2023},
  pages        = {136--137},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3603165.3607439},
  doi          = {10.1145/3603165.3607439},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acmturc/LuL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africon/MarteyAE23,
  author       = {Abraham S. Martey and
                  Ahmed Ali and
                  Ebenezer Esenogho},
  title        = {AI-Based Palm Print Recognition System for High-security Applications},
  booktitle    = {{IEEE} {AFRICON} 2023, Nairobi, Kenya, September 20-22, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AFRICON55910.2023.10293345},
  doi          = {10.1109/AFRICON55910.2023.10293345},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africon/MarteyAE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiiot/MohamedA23,
  author       = {Nader Mohamed and
                  Jameela Al{-}Jaroodi},
  title        = {Security Applications of Edge Intelligence},
  booktitle    = {2023 {IEEE} World {AI} IoT Congress (AIIoT), Seattle, WA, USA, June
                  7-10, 2023},
  pages        = {508--512},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AIIoT58121.2023.10174600},
  doi          = {10.1109/AIIOT58121.2023.10174600},
  timestamp    = {Thu, 20 Jul 2023 09:02:39 +0200},
  biburl       = {https://dblp.org/rec/conf/aiiot/MohamedA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiiot/ThakurHTKA23,
  author       = {Hasnain Nizam Thakur and
                  Abdullah Al Hayajneh and
                  Kutub Thakur and
                  Abu Kamruzzaman and
                  Md Liakat Ali},
  title        = {A Comprehensive Review of Wireless Security Protocols and Encryption
                  Applications},
  booktitle    = {2023 {IEEE} World {AI} IoT Congress (AIIoT), Seattle, WA, USA, June
                  7-10, 2023},
  pages        = {373--379},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AIIoT58121.2023.10174571},
  doi          = {10.1109/AIIOT58121.2023.10174571},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aiiot/ThakurHTKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsys/Androutsopoulos23,
  author       = {Georgios C. Androutsopoulos and
                  Giorgos Kappes and
                  Stergios V. Anastasiadis},
  title        = {Quantifying the Security Profile of Linux Applications},
  booktitle    = {Proceedings of the 14th {ACM} {SIGOPS} Asia-Pacific Workshop on Systems,
                  APSys 2023, Seoul, Republic of Korea, August 24-25, 2023},
  pages        = {80--86},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3609510.3609814},
  doi          = {10.1145/3609510.3609814},
  timestamp    = {Thu, 28 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apsys/Androutsopoulos23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KhovratovichBM23,
  author       = {Dmitry Khovratovich and
                  Mario Marhuenda Beltr{\'{a}}n and
                  Bart Mennink},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Generic Security of the {SAFE} {API} and Its Applications},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {VIII}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14445},
  pages        = {301--327},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8742-9\_10},
  doi          = {10.1007/978-981-99-8742-9\_10},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KhovratovichBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcca/YouJKN23,
  author       = {Shengwei You and
                  Aditya Joshi and
                  Andrey Kuehlkamp and
                  Jarek Nabrzyski},
  editor       = {Moayad Aloqaily and
                  Safa Otoum and
                  Ouns Bouachir and
                  Yaser Jararweh and
                  Ismaeel Al Ridhawi and
                  Khalid Al{-}Begain and
                  Mohammad A. Alsmirat},
  title        = {Mining User Behavior in Decentralized Applications for Blockchain
                  Trust and Security Analytics},
  booktitle    = {Fifth International Conference on Blockchain Computing and Applications,
                  {BCCA} 2023, Kuwait, Kuwait, October 24-26, 2023},
  pages        = {60--67},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/BCCA58897.2023.10338860},
  doi          = {10.1109/BCCA58897.2023.10338860},
  timestamp    = {Thu, 18 Jan 2024 12:09:19 +0100},
  biburl       = {https://dblp.org/rec/conf/bcca/YouJKN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdcloud/WangL23,
  author       = {Huan Wang and
                  Xiaoyang Lai},
  title        = {Quantum Information Technology for Network Security: An Application-Focused
                  Overview},
  booktitle    = {{IEEE} Intl Conf on Parallel {\&} Distributed Processing with
                  Applications, Big Data {\&} Cloud Computing, Sustainable Computing
                  {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom,
                  2023, Wuhan, China, December 21-24, 2023},
  pages        = {881--886},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00148},
  doi          = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM59178.2023.00148},
  timestamp    = {Thu, 18 Apr 2024 16:12:26 +0200},
  biburl       = {https://dblp.org/rec/conf/bdcloud/WangL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdmip/LaiZL23,
  author       = {Ji Lai and
                  Shijun Zhang and
                  Shuo Li},
  title        = {Research on the Application of Blockchain Technology in the Construction
                  of User Privacy Information Security Model},
  booktitle    = {Proceedings of the International Conference on Big Data Mining and
                  Information Processing, {BDMIP} 2023, Xiamen City, China, China, November
                  17-19, 2023},
  pages        = {72--76},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3645279.3645292},
  doi          = {10.1145/3645279.3645292},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bdmip/LaiZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdmip/XuZL23,
  author       = {Xiangsen Xu and
                  Shijun Zhang and
                  Ji Lai},
  title        = {Application of Internet Big Data in Network Security Situation Assessment},
  booktitle    = {Proceedings of the International Conference on Big Data Mining and
                  Information Processing, {BDMIP} 2023, Xiamen City, China, China, November
                  17-19, 2023},
  pages        = {77--81},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3645279.3645293},
  doi          = {10.1145/3645279.3645293},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bdmip/XuZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataservice/BatsisMP23,
  author       = {Georgios Batsis and
                  Ioannis Mademlis and
                  Georgios Th. Papadopoulos},
  title        = {Illicit item detection in X-ray images for security applications},
  booktitle    = {{IEEE} Ninth International Conference on Big Data Computing Service
                  and Applications, BigDataService 2023, Athens, Greece, July 17-20,
                  2023},
  pages        = {63--70},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/BigDataService58306.2023.00016},
  doi          = {10.1109/BIGDATASERVICE58306.2023.00016},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataservice/BatsisMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/brains/SurmontWC23,
  author       = {Jasper Surmont and
                  Weihong Wang and
                  Tom Van Cutsem},
  title        = {Static Application Security Testing of Consensus-Critical Code in
                  the Cosmos Network},
  booktitle    = {5th Conference on Blockchain Research {\&} Applications for Innovative
                  Networks and Services, {BRAINS} 2023, Paris, France, October 11-13,
                  2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/BRAINS59668.2023.10316912},
  doi          = {10.1109/BRAINS59668.2023.10316912},
  timestamp    = {Tue, 05 Dec 2023 20:47:36 +0100},
  biburl       = {https://dblp.org/rec/conf/brains/SurmontWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caibda/YuZYL23,
  author       = {Ying Yu and
                  Kangping Zhao and
                  Zhiyang Yu and
                  Zhiyu Lang},
  editor       = {Gheorghe Grigoras and
                  Pascal Lorenz},
  title        = {Research on the Application of Domestic Autonomous Cryptography Algorithms
                  in the Field of Ecological Environment Information Security},
  booktitle    = {Advances in Artificial Intelligence, Big Data and Algorithms - Proceedings
                  of the 3rd International Conference on Artificial Intelligence, Big
                  Data and Algorithms {(CAIBDA} 2023) - 16-18 June 2023, Zhengzhou,
                  China},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {373},
  pages        = {949--955},
  publisher    = {{IOS} Press},
  year         = {2023},
  url          = {https://doi.org/10.3233/FAIA230906},
  doi          = {10.3233/FAIA230906},
  timestamp    = {Wed, 06 Dec 2023 14:36:43 +0100},
  biburl       = {https://dblp.org/rec/conf/caibda/YuZYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShiSYZ023,
  author       = {Qingkai Shi and
                  Junyang Shao and
                  Yapeng Ye and
                  Mingwei Zheng and
                  Xiangyu Zhang},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Lifting Network Protocol Implementation to Precise Format Specification
                  with Security Applications},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {1287--1301},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3616614},
  doi          = {10.1145/3576915.3616614},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShiSYZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cecnet/LiuWNLZLW23,
  author       = {Qing Liu and
                  Yu Wu and
                  Jing Nie and
                  Yi Li and
                  Xiaohu Zheng and
                  Kang Liu and
                  Ping Wang},
  editor       = {Antonio J. Tall{\'{o}}n{-}Ballesteros and
                  Estefan{\'{\i}}a Cort{\'{e}}s{-}Ancos and
                  Diego A. L{\'{o}}pez Garc{\'{\i}}a},
  title        = {Simplified Monocular Ranging Anomalous Behaviour Detection Model for
                  Security Monitoring Applications},
  booktitle    = {Electronics, Communications and Networks - Proceedings of the 13th
                  International Conference (CECNet 2023), Macao, China, 17-20 November
                  2023},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {381},
  pages        = {664--671},
  publisher    = {{IOS} Press},
  year         = {2023},
  url          = {https://doi.org/10.3233/FAIA231251},
  doi          = {10.3233/FAIA231251},
  timestamp    = {Wed, 31 Jan 2024 15:27:35 +0100},
  biburl       = {https://dblp.org/rec/conf/cecnet/LiuWNLZLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cipae/HeMRZ23,
  author       = {Chengquan He and
                  Tong Mu and
                  Weiping Ren and
                  Bohua Zhao},
  title        = {LPIXray: {A} Large-scale Logistics Prohibited Item X-ray Dataset for
                  the Application of Deep Learning in Security Inspection},
  booktitle    = {International Conference on Computers, Information Processing and
                  Advanced Education, {CIPAE} 2023, Ottawa, ON, Canada, August 26-28,
                  2023},
  pages        = {481--485},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CIPAE60493.2023.00097},
  doi          = {10.1109/CIPAE60493.2023.00097},
  timestamp    = {Thu, 25 Jan 2024 09:25:30 +0100},
  biburl       = {https://dblp.org/rec/conf/cipae/HeMRZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/XuCCZY23,
  author       = {Shiyuan Xu and
                  Yibo Cao and
                  Xue Chen and
                  Yanmin Zhao and
                  Siu{-}Ming Yiu},
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {Post-Quantum Public-Key Authenticated Searchable Encryption with Forward
                  Security: General Construction, and Applications},
  booktitle    = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14526},
  pages        = {274--298},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0942-7\_14},
  doi          = {10.1007/978-981-97-0942-7\_14},
  timestamp    = {Mon, 11 Mar 2024 15:20:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/XuCCZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnml/Li23,
  author       = {Hui Li},
  title        = {Application of artificial intelligence in the construction of computer
                  big data security technology platform},
  booktitle    = {Proceedings of the 2023 International Conference on Communication
                  Network and Machine Learning, {CNML} 2023, Zhengzhou, China, October
                  27-28, 2023},
  pages        = {191--195},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3640912.3640950},
  doi          = {10.1145/3640912.3640950},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnml/Li23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnml/Wang23,
  author       = {Xinbo Wang},
  title        = {Application of Deep Learning Based on Artificial Intelligence in Security
                  Monitoring System},
  booktitle    = {Proceedings of the 2023 International Conference on Communication
                  Network and Machine Learning, {CNML} 2023, Zhengzhou, China, October
                  27-28, 2023},
  pages        = {211--214},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3640912.3640954},
  doi          = {10.1145/3640912.3640954},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnml/Wang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnml/Zhang23a,
  author       = {Ruihang Zhang},
  title        = {Enhancing IoT Security-Exploring the Application of Blockchain},
  booktitle    = {Proceedings of the 2023 International Conference on Communication
                  Network and Machine Learning, {CNML} 2023, Zhengzhou, China, October
                  27-28, 2023},
  pages        = {259--263},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3640912.3640963},
  doi          = {10.1145/3640912.3640963},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnml/Zhang23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colins/KyrychenkoSS23,
  author       = {Iryna Kyrychenko and
                  Olha Shyshlo and
                  Nadiia Shanidze},
  editor       = {Olga Cherednichenko and
                  Lyubomyr Chyrun and
                  Victoria Vysotska},
  title        = {Minimizing Security Risks and Improving System Reliability in Blockchain
                  Applications: {\cyrchar\cyra} Testing Method Analysis},
  booktitle    = {Proceedings of the 7th International Conference on Computational Linguistics
                  and Intelligent Systems. Volume {III:} Intelligent Systems Workshop,
                  Kharkiv, Ukraine, April 20-21, 2023},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3403},
  pages        = {423--433},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3403/paper33.pdf},
  timestamp    = {Tue, 27 Jun 2023 15:53:41 +0200},
  biburl       = {https://dblp.org/rec/conf/colins/KyrychenkoSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comad/SureshanD23,
  author       = {Shruti Sureshan and
                  Debasis Das},
  title        = {Few-Shot Learning based Anomaly Detection in Security Applications},
  booktitle    = {Proceedings of the 6th Joint International Conference on Data Science
                  {\&} Management of Data (10th {ACM} {IKDD} {CODS} and 28th COMAD),
                  Mumbai, India, January 4-7, 2023},
  pages        = {295--296},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3570991.3571040},
  doi          = {10.1145/3570991.3571040},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/comad/SureshanD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/PotterSM23,
  author       = {Connor J. Potter and
                  Neetesh Saxena and
                  Soumyadev Maity},
  title        = {Clarity: Analysing Security in Web Applications},
  booktitle    = {15th International Conference on COMmunication Systems {\&} NETworkS,
                  {COMSNETS} 2023, Bangalore, India, January 3-8, 2023},
  pages        = {522--528},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/COMSNETS56262.2023.10041289},
  doi          = {10.1109/COMSNETS56262.2023.10041289},
  timestamp    = {Fri, 24 Feb 2023 15:04:53 +0100},
  biburl       = {https://dblp.org/rec/conf/comsnets/PotterSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscs/AbateCCAFV23,
  author       = {Andrea Francesco Abate and
                  Aniello Castiglione and
                  Lucia Cimmino and
                  Davide De Angelis and
                  Sara Flauto and
                  Alberto Volpe},
  editor       = {Ioan Dumitrache and
                  Adina Magda Florea and
                  Mihnea Alexandru Moisescu and
                  Alexandru Dumitrascu and
                  Florin Pop},
  title        = {On the (in)Security and Weaknesses of Commonly Used Applications on
                  Large-Scale Distributed Systems},
  booktitle    = {24th International Conference on Control Systems and Computer Science,
                  {CSCS} 2023, Bucharest, Romania, May 24-26, 2023},
  pages        = {572--579},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSCS59211.2023.00096},
  doi          = {10.1109/CSCS59211.2023.00096},
  timestamp    = {Fri, 25 Aug 2023 07:55:14 +0200},
  biburl       = {https://dblp.org/rec/conf/cscs/AbateCCAFV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscs/SovianyGD23,
  author       = {Sorin Soviany and
                  Cristina Gheorghe and
                  Minodora Dumitrache},
  editor       = {Ioan Dumitrache and
                  Adina Magda Florea and
                  Mihnea Alexandru Moisescu and
                  Alexandru Dumitrascu and
                  Florin Pop},
  title        = {A Multimodal Biometric System for the e-Health applications security},
  booktitle    = {24th International Conference on Control Systems and Computer Science,
                  {CSCS} 2023, Bucharest, Romania, May 24-26, 2023},
  pages        = {586--593},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSCS59211.2023.00098},
  doi          = {10.1109/CSCS59211.2023.00098},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscs/SovianyGD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BatyWHFT23,
  author       = {Matthieu Baty and
                  Pierre Wilke and
                  Guillaume Hiet and
                  Arnaud Fontaine and
                  Alix Trieu},
  title        = {A Generic Framework to Develop and Verify Security Mechanisms at the
                  Microarchitectural Level: Application to Control-Flow Integrity},
  booktitle    = {36th {IEEE} Computer Security Foundations Symposium, {CSF} 2023, Dubrovnik,
                  Croatia, July 10-14, 2023},
  pages        = {372--387},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSF57540.2023.00029},
  doi          = {10.1109/CSF57540.2023.00029},
  timestamp    = {Tue, 05 Sep 2023 20:33:27 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BatyWHFT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/HatzivasilisIKCSPMLBR23,
  author       = {George Hatzivasilis and
                  Sotiris Ioannidis and
                  Grigoris Kalogiannis and
                  Manolis Chatzimpyrros and
                  George Spanoudakis and
                  Guillermo Jim{\'{e}}nez Prieto and
                  Araceli Rojas Morgan and
                  Miguel Juaniz Lopez and
                  Cataldo Basile and
                  Jos{\'{e}} Francisco Ruiz},
  title        = {Continuous Security Assurance of Modern Supply-Chain Ecosystems with
                  Application in Autonomous Driving: The {FISHY} approach for the secure
                  autonomous driving domain},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2023, Venice, Italy, July 31 - Aug. 2, 2023},
  pages        = {464--469},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSR57506.2023.10224971},
  doi          = {10.1109/CSR57506.2023.10224971},
  timestamp    = {Wed, 06 Sep 2023 08:09:39 +0200},
  biburl       = {https://dblp.org/rec/conf/csr2/HatzivasilisIKCSPMLBR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/SuraniBWKRVD23,
  author       = {Aishwarya Surani and
                  Amani Bawaked and
                  Matthew Wheeler and
                  Braden Kelsey and
                  Nikki Roberts and
                  David Vincent and
                  Sanchari Das},
  editor       = {Vijayalakshmi Atluri and
                  Anna Lisa Ferrara},
  title        = {Security and Privacy of Digital Mental Health: An Analysis of Web
                  Services and Mobile Applications},
  booktitle    = {Data and Applications Security and Privacy {XXXVII} - 37th Annual
                  {IFIP} {WG} 11.3 Conference, DBSec 2023, Sophia-Antipolis, France,
                  July 19-21, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13942},
  pages        = {319--338},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-37586-6\_19},
  doi          = {10.1007/978-3-031-37586-6\_19},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/SuraniBWKRVD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dessert/SklyarK23,
  author       = {Vladimir V. Sklyar and
                  Vyacheslav Kharchenko},
  title        = {Application of Business Analysis Techniques for Safety-Critical and
                  Security-Critical Requirements Engineering},
  booktitle    = {13th International Conference on Dependable Systems, Services and
                  Technologies, {DESSERT} 2023, Athens, Greece, October 13-15, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DESSERT61349.2023.10416481},
  doi          = {10.1109/DESSERT61349.2023.10416481},
  timestamp    = {Sat, 24 Feb 2024 20:42:46 +0100},
  biburl       = {https://dblp.org/rec/conf/dessert/SklyarK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dev/ChibooraCBG23,
  author       = {Trevor Henry Chiboora and
                  Lenah Chacha and
                  Theoneste Byagutangaza and
                  Assane Gueye},
  editor       = {Melissa Densmore and
                  Monojit Choudhury and
                  Josiah Chavula},
  title        = {Evaluating Mobile Banking Application Security Posture Using the OWASP's
                  {MASVS} Framework},
  booktitle    = {Proceedings of the 6th {ACM} {SIGCAS/SIGCHI} Conference on Computing
                  and Sustainable Societies, {COMPASS} 2023, Cape Town, South Africa,
                  August 16-19, 2023},
  pages        = {99--106},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3588001.3609367},
  doi          = {10.1145/3588001.3609367},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dev/ChibooraCBG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dft/GuhaB23,
  author       = {Krishnendu Guha and
                  Gouriprasad Bhattacharyya},
  editor       = {Luca Cassano and
                  Mihalis Psarakis and
                  Marcello Traiola and
                  Alberto Bosio},
  title        = {A Self Aware Security Approach for Real Time Neural Network Applications
                  from Row Hammer Attacks in Multi {FPGA} Multi User Environment},
  booktitle    = {{IEEE} International Symposium on Defect and Fault Tolerance in {VLSI}
                  and Nanotechnology Systems, {DFT} 2023, Juan-Les-Pins, France, October
                  3-5, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DFT59622.2023.10313547},
  doi          = {10.1109/DFT59622.2023.10313547},
  timestamp    = {Tue, 21 Nov 2023 12:38:06 +0100},
  biburl       = {https://dblp.org/rec/conf/dft/GuhaB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drcn/KyriakakisI23,
  author       = {Thomas Kyriakakis and
                  Sotiris Ioannidis},
  title        = {A Moving Target Defense Security Solution for IoT Applications},
  booktitle    = {19th International Conference on the Design of Reliable Communication
                  Networks, {DRCN} 2023, Vilanova i la Geltru, Spain, April 17-20, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DRCN57075.2023.10108190},
  doi          = {10.1109/DRCN57075.2023.10108190},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drcn/KyriakakisI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/LongXJZDG23,
  author       = {Yu Long and
                  Xiayu Xiang and
                  Xiao Jing and
                  Angxiao Zhao and
                  Lei Du and
                  Zhaoquan Gu},
  title        = {{MDATA} Model Based Cyber Security Knowledge Representation and Application},
  booktitle    = {8th International Conference on Data Science in Cyberspace, {DSC}
                  2023, Hefei, China, August 18-20, 2023},
  pages        = {483--490},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSC59305.2023.00076},
  doi          = {10.1109/DSC59305.2023.00076},
  timestamp    = {Fri, 09 Feb 2024 20:38:47 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/LongXJZDG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai2/DeacSuteuTPPD23,
  author       = {Dorin Vasile Deac{-}Suteu and
                  Aurel Mihail Titu and
                  Maria Popa and
                  Alina Bianca Pop and
                  Diana Dragomir},
  title        = {Provision of {IT} security access to integrated applications for Local
                  and Regional Utility Service providers approach},
  booktitle    = {15th International Conference on Electronics, Computers and Artificial
                  Intelligence, {ECAI} 2023, Bucharest, Romania, June 29-30, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ECAI58194.2023.10193926},
  doi          = {10.1109/ECAI58194.2023.10193926},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecai2/DeacSuteuTPPD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/efmi-stc/BaltzerB23,
  author       = {Caroline Baltzer and
                  Stefano Bonacina},
  editor       = {Mauro Giacomini and
                  Lacramioara Stoicu{-}Tivadar and
                  Gabriella Balestra and
                  Arriel Benis and
                  Stefano Bonacina and
                  Alessio Bottrighi and
                  Thomas M. Deserno and
                  Parisis Gallos and
                  Lenka Lhotsk{\'{a}} and
                  Sara Marceglia and
                  Alejandro C. Pazos Sierra and
                  Samanta Rosati and
                  Lucia Sacchi},
  title        = {Enhancing Women's Health: An Assessment of Data Privacy and Security
                  of Menopause FemTech Applications},
  booktitle    = {Telehealth Ecosystems in Practice - Proceedings of the {EFMI} Special
                  Topic Conference 2023, {EFMI-STC} 2023, Turin, Italy, 25 - 27 October
                  2023},
  series       = {Studies in Health Technology and Informatics},
  volume       = {309},
  pages        = {155--159},
  publisher    = {{IOS} Press},
  year         = {2023},
  url          = {https://doi.org/10.3233/SHTI230765},
  doi          = {10.3233/SHTI230765},
  timestamp    = {Wed, 22 May 2024 08:25:52 +0200},
  biburl       = {https://dblp.org/rec/conf/efmi-stc/BaltzerB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eitce/TangDWC23,
  author       = {Xueyan Tang and
                  Yuying Du and
                  Zhengyang Wang and
                  Shawn Chong},
  title        = {{EIP} Security Analysis: Application Program Standards, Attack Events,
                  and Security Vulnerabilities},
  booktitle    = {Proceedings of the 2023 7th International Conference on Electronic
                  Information Technology and Computer Engineering, {EITCE} 2023, Xiamen,
                  China, October 20-22, 2023},
  pages        = {1239--1244},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3650400.3650609},
  doi          = {10.1145/3650400.3650609},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eitce/TangDWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etfa/HosseiniSK23,
  author       = {Ali Mohammad Hosseini and
                  Thilo Sauter and
                  Wolfgang Kastner},
  title        = {Formal Verification of Safety and Security Properties in Industry
                  4.0 Applications},
  booktitle    = {28th {IEEE} International Conference on Emerging Technologies and
                  Factory Automation, {ETFA} 2023, Sinaia, Romania, September 12-15,
                  2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ETFA54631.2023.10275690},
  doi          = {10.1109/ETFA54631.2023.10275690},
  timestamp    = {Mon, 23 Oct 2023 09:15:55 +0200},
  biburl       = {https://dblp.org/rec/conf/etfa/HosseiniSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ets/ZhangTF23,
  author       = {Tao Zhang and
                  Mark M. Tehranipoor and
                  Farimah Farahmandi},
  title        = {BitFREE: On Significant Speedup and Security Applications of {FPGA}
                  Bitstream Format Reverse Engineering},
  booktitle    = {{IEEE} European Test Symposium, {ETS} 2023, Venezia, Italy, May 22-26,
                  2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ETS56758.2023.10174155},
  doi          = {10.1109/ETS56758.2023.10174155},
  timestamp    = {Fri, 14 Jul 2023 22:01:39 +0200},
  biburl       = {https://dblp.org/rec/conf/ets/ZhangTF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/NadeemVCPDBV23,
  author       = {Azqa Nadeem and
                  Dani{\"{e}}l Vos and
                  Clinton Cao and
                  Luca Pajola and
                  Simon Dieck and
                  Robert Baumgartner and
                  Sicco Verwer},
  title        = {SoK: Explainable Machine Learning for Computer Security Applications},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {221--240},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00022},
  doi          = {10.1109/EUROSP57164.2023.00022},
  timestamp    = {Mon, 07 Aug 2023 15:56:23 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/NadeemVCPDBV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurousec/KishnaniNDD23,
  author       = {Urvashi Kishnani and
                  Naheem Noah and
                  Sanchari Das and
                  Rinku Dewri},
  title        = {Assessing Security, Privacy, User Interaction, and Accessibility Features
                  in Popular E-Payment Applications},
  booktitle    = {Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC
                  2023, Copenhagen, Denmark, October 16-17, 2023},
  pages        = {143--157},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617072.3617102},
  doi          = {10.1145/3617072.3617102},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurousec/KishnaniNDD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoapps/HassanSVPM13,
  author       = {Mujtaba Hassan and
                  Arish Sateesan and
                  Jo Vliegen and
                  Stjepan Picek and
                  Nele Mentens},
  editor       = {Jo{\~{a}}o Correia and
                  Stephen L. Smith and
                  Raneem Qaddoura},
  title        = {Evolving Non-cryptographic Hash Functions Using Genetic Programming
                  for High-speed Lookups in Network Security Applications},
  booktitle    = {Applications of Evolutionary Computation - 26th European Conference,
                  EvoApplications 2023, Held as Part of EvoStar 2023, Brno, Czech Republic,
                  April 12-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13989},
  pages        = {302--318},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30229-9\_20},
  doi          = {10.1007/978-3-031-30229-9\_20},
  timestamp    = {Tue, 29 Aug 2023 15:18:02 +0200},
  biburl       = {https://dblp.org/rec/conf/evoapps/HassanSVPM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficta/VeerasamyNKSSM23,
  author       = {B. Veerasamy and
                  D. Nageswari and
                  S. N. Kumar and
                  Anil Shirgire and
                  Ramachandran Sitharthan and
                  A. Jasmine Gnana Malar},
  editor       = {Vikrant Bhateja and
                  Fiona Carroll and
                  Jo{\~{a}}o Manuel R. S. Tavares and
                  Sandeep Singh Sengar and
                  Peter Peer},
  title        = {An Optimized Cyber Security Framework for Network Applications},
  booktitle    = {Intelligent Data Engineering and Analytics - Proceedings of the 11th
                  International Conference on Frontiers of Intelligent Computing: Theory
                  and Applications {(FICTA} 2023), Cardiff, UK, 11-12 April 2023},
  series       = {Smart Innovation, Systems and Technologies},
  volume       = {371},
  pages        = {511--518},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-6706-3\_45},
  doi          = {10.1007/978-981-99-6706-3\_45},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ficta/VeerasamyNKSSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fruct/WenK23,
  author       = {Shao{-}Fang Wen and
                  Basel Katt},
  title        = {A Metamodel for Web Application Security Evaluation},
  booktitle    = {34th Conference of Open Innovations Association, {FRUCT} 2023, Riga,
                  Latvia, November 15-17, 2023},
  pages        = {172--182},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://ieeexplore.ieee.org/document/10328176},
  timestamp    = {Mon, 11 Dec 2023 15:49:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fruct/WenK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/OgawaAEHC23,
  author       = {Michael{-}Brian Ogawa and
                  Brent Auernheimer and
                  Barbara Endicott{-}Popovsky and
                  Randy J. Hinrichs and
                  Martha E. Crosby},
  editor       = {Dylan D. Schmorrow and
                  Cali M. Fidopiastis},
  title        = {Privacy and Security Perceptions in Augmented Cognition Applications},
  booktitle    = {Augmented Cognition - 17th International Conference, {AC} 2023, Held
                  as Part of the 25th {HCI} International Conference, {HCII} 2023, Copenhagen,
                  Denmark, July 23-28, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14019},
  pages        = {429--440},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35017-7\_27},
  doi          = {10.1007/978-3-031-35017-7\_27},
  timestamp    = {Thu, 13 Jul 2023 10:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/OgawaAEHC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/RaharjaNMS23,
  author       = {Jaka Raharja and
                  Achmad Nurmandi and
                  Misran and
                  Dimas Subekti},
  editor       = {Abbas Moallem},
  title        = {Analysis of Information Quality and Data Security in the {KPU} (General
                  Elections Commission) {SIDALIH} (Voter Data Information System) Application},
  booktitle    = {{HCI} for Cybersecurity, Privacy and Trust - 5th International Conference,
                  {HCI-CPT} 2023, Held as Part of the 25th {HCI} International Conference,
                  {HCII} 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14045},
  pages        = {90--100},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35822-7\_7},
  doi          = {10.1007/978-3-031-35822-7\_7},
  timestamp    = {Thu, 13 Jul 2023 13:58:21 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/RaharjaNMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaai/BaniyaNBHJ23,
  author       = {Pashupati Baniya and
                  Parma Nand and
                  Bharat Bhushan and
                  Alaa Ali Hameed and
                  Akhtar Jamil},
  title        = {Blockchain Based Security Framework for Internet of Medical Things
                  (IoMT) Applications},
  booktitle    = {Proceedings of the 2023 7th International Conference on Advances in
                  Artificial Intelligence, {ICAAI} 2023, Istanbul, Turkiye, October
                  13-15, 2023},
  pages        = {73--78},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3633598.3633611},
  doi          = {10.1145/3633598.3633611},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaai/BaniyaNBHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icai2/DonosoCCDE23,
  author       = {Diego Donoso and
                  Gino Cornejo and
                  Carlos Calahorrano and
                  Santiago Donoso and
                  Erika Escobar},
  editor       = {Hector Florez and
                  Marcelo Le{\'{o}}n},
  title        = {Under the Spotlight! Facial Recognition Applications in Prison Security:
                  Bayesian Modeling and {ISO27001} Standard Implementation},
  booktitle    = {Applied Informatics - 6th International Conference, {ICAI} 2023, Guayaquil,
                  Ecuador, October 26-28, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1874},
  pages        = {419--432},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-46813-1\_28},
  doi          = {10.1007/978-3-031-46813-1\_28},
  timestamp    = {Wed, 21 Feb 2024 17:11:18 +0100},
  biburl       = {https://dblp.org/rec/conf/icai2/DonosoCCDE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaice/LiZLCLH23,
  author       = {Junhao Li and
                  Jiacheng Zhou and
                  Lei Li and
                  Baowei Cheng and
                  Shengfei Li and
                  Wenhao He},
  title        = {Robust Detection for Adversarial Attacks - Based on a Graph Neural
                  Network for Web Application Security Protection System},
  booktitle    = {Proceedings of the 4th International Conference on Artificial Intelligence
                  and Computer Engineering, {ICAICE} 2023, Dalian, China, November 17-19,
                  2023},
  pages        = {927--932},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3652628.3652782},
  doi          = {10.1145/3652628.3652782},
  timestamp    = {Fri, 24 May 2024 11:47:23 +0200},
  biburl       = {https://dblp.org/rec/conf/icaice/LiZLCLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/XueOR23,
  author       = {Li Xue and
                  Katia Obraczka and
                  Zouheir Rezki},
  title        = {Cross-Layer Device Fingerprinting and Its Applications to Network
                  Security},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2023, Rome,
                  Italy, May 28 - June 1, 2023},
  pages        = {5253--5258},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICC45041.2023.10279603},
  doi          = {10.1109/ICC45041.2023.10279603},
  timestamp    = {Thu, 02 Nov 2023 17:09:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/XueOR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/YakanFAA23,
  author       = {Hadi Yakan and
                  Ilhem Fajjari and
                  Nadjib Aitsaadi and
                  C{\'{e}}dric Adjih},
  title        = {A Novel {AI} Security Application Function of 5G Core Network for
                  {V2X} {C-ITS} Facilities Layer},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2023, Rome,
                  Italy, May 28 - June 1, 2023},
  pages        = {6211--6217},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICC45041.2023.10279621},
  doi          = {10.1109/ICC45041.2023.10279621},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/YakanFAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/LiuLCXXB23,
  author       = {Zhibo Liu and
                  Xiaozhen Lu and
                  Yuhan Chen and
                  Yilin Xiao and
                  Liang Xiao and
                  Yanling Bu},
  title        = {Deep Reinforcement Learning for Network Security Applications With
                  {A} Safety Guide},
  booktitle    = {{IEEE/CIC} International Conference on Communications in China, {ICCC}
                  2023, Dalian, China, August 10-12, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCC57788.2023.10233612},
  doi          = {10.1109/ICCC57788.2023.10233612},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccchina/LiuLCXXB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/CK23,
  author       = {Naveen Rahite C and
                  Manoj Senthil K},
  title        = {An In-Depth Review of Blowfish Encryption Algorithm: Security, Performance,
                  and Application},
  booktitle    = {14th International Conference on Computing Communication and Networking
                  Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCCNT56998.2023.10307323},
  doi          = {10.1109/ICCCNT56998.2023.10307323},
  timestamp    = {Thu, 30 Nov 2023 16:40:53 +0100},
  biburl       = {https://dblp.org/rec/conf/icccnt/CK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/ChattopadhyayS23,
  author       = {Amartyanil Chattopadhyay and
                  Divya Sripada},
  title        = {Security Analysis and Threat Modelling of Mobile Banking Applications},
  booktitle    = {14th International Conference on Computing Communication and Networking
                  Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCCNT56998.2023.10307577},
  doi          = {10.1109/ICCCNT56998.2023.10307577},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccnt/ChattopadhyayS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icceic/XiangHXWSS23,
  author       = {Hang Xiang and
                  Jiujiang Han and
                  Ming Xian and
                  Huimei Wang and
                  Yi Sun and
                  Peng Sun},
  title        = {Research on the Application of Reinforcement Learning in Network Security},
  booktitle    = {4th International Conference on Computer Engineering and Intelligent
                  Control, {ICCEIC} 2023, Guangzhou, China, October 20-22, 2023},
  pages        = {31--34},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCEIC60201.2023.10426719},
  doi          = {10.1109/ICCEIC60201.2023.10426719},
  timestamp    = {Thu, 29 Feb 2024 09:23:26 +0100},
  biburl       = {https://dblp.org/rec/conf/icceic/XiangHXWSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccel/Kumar0JI23,
  author       = {Randhir Kumar and
                  Prabhat Kumar and
                  Alireza Jolfaei and
                  A. K. M. Najmul Islam},
  title        = {An Integrated Framework for Enhancing Security and Privacy in IoT-Based
                  Business Intelligence Applications},
  booktitle    = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2023,
                  Las Vegas, NV, USA, January 6-8, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCE56470.2023.10043450},
  doi          = {10.1109/ICCE56470.2023.10043450},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccel/Kumar0JI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsie/Wang23,
  author       = {Zhen Wang},
  title        = {The Application and Practice of Computer Network Security Technology
                  in Electronic Information Engineering},
  booktitle    = {Proceedings of the 8th International Conference on Cyber Security
                  and Information Engineering, {ICCSIE} 2023, Putrajaya, Malaysia, September
                  22-24, 2023},
  pages        = {73--77},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617184.3618035},
  doi          = {10.1145/3617184.3618035},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsie/Wang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsie/YeWWWYT23,
  author       = {Xin Ye and
                  Shimin Wang and
                  Han Wang and
                  Qinwei Wei and
                  Ting Yang and
                  Yu Tao},
  title        = {Application of Knowledge Graph in Financial Information Security Strategy},
  booktitle    = {Proceedings of the 8th International Conference on Cyber Security
                  and Information Engineering, {ICCSIE} 2023, Putrajaya, Malaysia, September
                  22-24, 2023},
  pages        = {188--192},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617184.3630130},
  doi          = {10.1145/3617184.3630130},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsie/YeWWWYT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccvit/HongLLYOHW23,
  author       = {Sheng Hong and
                  Yizhong Lai and
                  Yuzhou Li and
                  Yang You and
                  Shuai Ou and
                  Fei Han and
                  Tiejun Wu},
  title        = {A Reference Model for Information Security Applications of Generative
                  Adversarial Network Variants},
  booktitle    = {Proceedings of the 2023 International Conference on Computer, Vision
                  and Intelligent Technology, {ICCVIT} 2023, Chenzhou, China, August
                  25-28, 2023},
  pages        = {7:1--7:8},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627341.3630381},
  doi          = {10.1145/3627341.3630381},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccvit/HongLLYOHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/DasBDCGB23,
  author       = {Debashis Das and
                  Sourav Banerjee and
                  Kousik Dasgupta and
                  Pushpita Chatterjee and
                  Uttam Ghosh and
                  Utpal Biswas},
  title        = {Blockchain Enabled {SDN} Framework for Security Management in 5G Applications},
  booktitle    = {24th International Conference on Distributed Computing and Networking,
                  {ICDCN} 2023, Kharagpur, India, January 4-7, 2023},
  pages        = {414--419},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3571306.3571445},
  doi          = {10.1145/3571306.3571445},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcn/DasBDCGB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/Zhao23,
  author       = {Kaifa Zhao},
  title        = {Demystifying Privacy and Security Issues in Potentially Harmful Mobile
                  Applications},
  booktitle    = {43rd {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2023, Hong Kong, July 18-21, 2023},
  pages        = {963--964},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICDCS57875.2023.00102},
  doi          = {10.1109/ICDCS57875.2023.00102},
  timestamp    = {Tue, 24 Oct 2023 14:47:33 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/Zhao23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/NashC23,
  author       = {Aleck Nash and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Password Managers and Vault Application Security and Forensics: Research
                  Challenges and Future Opportunities},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {31--53},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_3},
  doi          = {10.1007/978-3-031-56583-0\_3},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/NashC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfnds/RakhimberdievTA23,
  author       = {Kuvonchbek Bakhtiyorovich Rakhimberdiev and
                  Asiya Tureniyazova and
                  Ali Arziev and
                  Hurlixa Sarsenbaeva and
                  Dauletmurat Bimuratov},
  title        = {Application of Cryptographic Algorithms in Ensuring and Improving
                  the Security of Bank Transactions in the Digital Economy},
  booktitle    = {Proceedings of the 7th International Conference on Future Networks
                  and Distributed Systems, {ICFNDS} 2023, Dubai, United Arab Emirates,
                  December 21-22, 2023},
  pages        = {503--510},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3644713.3644787},
  doi          = {10.1145/3644713.3644787},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icfnds/RakhimberdievTA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icimmi/SinghK23,
  author       = {Rinki Singh and
                  Deepika Kukreja},
  editor       = {Dinesh Goyal and
                  Anil Kumar and
                  Dharm Singh and
                  Marcin Paprzycki and
                  Pooja Jain and
                  B. B. Gupta and
                  Uday Pratap Singh},
  title        = {Blockchain for IoT Security {\&} Privacy: Applications, Challenges
                  and Future Directions},
  booktitle    = {Proceedings of the 5th International Conference on Information Management
                  {\&} Machine Intelligence, Jaipur, India, November 23-25, 2023},
  pages        = {57:1--57:5},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3647444.3647883},
  doi          = {10.1145/3647444.3647883},
  timestamp    = {Fri, 17 May 2024 16:58:38 +0200},
  biburl       = {https://dblp.org/rec/conf/icimmi/SinghK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icise/BinYH23,
  author       = {Dongmei Bin and
                  Chunyan Yang and
                  Songming Han},
  title        = {Application Design of Data Security Pool System Based on Network Security
                  Data Link Technology},
  booktitle    = {8th International Conference on Information Systems Engineering, {ICISE}
                  2023, Dalian, China, June 23-25, 2023},
  pages        = {419--423},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICISE60366.2023.00095},
  doi          = {10.1109/ICISE60366.2023.00095},
  timestamp    = {Thu, 23 Nov 2023 21:16:33 +0100},
  biburl       = {https://dblp.org/rec/conf/icise/BinYH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/AkbarRSKT23,
  author       = {Khandakar Ashrafi Akbar and
                  Fariha Ishrat Rahman and
                  Anoop Singhal and
                  Latifur Khan and
                  Bhavani Thuraisingham},
  editor       = {Vallipuram Muthukkumarasamy and
                  Sithu D. Sudarsan and
                  Rudrapatna K. Shyamasundar},
  title        = {The Design and Application of a Unified Ontology for Cyber Security},
  booktitle    = {Information Systems Security - 19th International Conference, {ICISS}
                  2023, Raipur, India, December 16-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {23--41},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-49099-6\_2},
  doi          = {10.1007/978-3-031-49099-6\_2},
  timestamp    = {Thu, 04 Jan 2024 08:13:46 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/AkbarRSKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitjo/AlkhanafsehS23,
  author       = {Mohammad Y. Alkhanafseh and
                  Ola M. Surakhi},
  title        = {A Dynamic Locality Sensitive Hashing Algorithm for Efficient Security
                  Applications},
  booktitle    = {International Conference on Information Technology, {ICIT} 2023, Amman,
                  Jordan, August 9-10, 2023},
  pages        = {524--530},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICIT58056.2023.10226046},
  doi          = {10.1109/ICIT58056.2023.10226046},
  timestamp    = {Wed, 06 Sep 2023 16:07:28 +0200},
  biburl       = {https://dblp.org/rec/conf/icitjo/AlkhanafsehS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmlca/CaoFLWY23,
  author       = {Ruifeng Cao and
                  Zhichun Fang and
                  Shaowa Lin and
                  Jian Wu and
                  Ting Yuan},
  title        = {The Application of Intelligent Computing and Machine Learning in the
                  Security Guarantee and Information Security Scheme Design},
  booktitle    = {4th International Conference on Machine Learning and Computer Application,
                  {ICMLCA} 2023, Hangzhou, China, October 27-29, 2023},
  pages        = {396--400},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3650215.3650285},
  doi          = {10.1145/3650215.3650285},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmlca/CaoFLWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmtel/WangFCZ23,
  author       = {Yixin Wang and
                  Weiqing Fang and
                  Liang Chen and
                  Wei Zhu},
  editor       = {Bing Wang and
                  Zuojin Hu and
                  Xianwei Jiang and
                  Yu{-}Dong Zhang},
  title        = {Research on the Construction and Application of Smart Hospital Based
                  on Mobile Terminal Security Aggregation Business Management Platform},
  booktitle    = {Multimedia Technology and Enhanced Learning - 5th {EAI} International
                  Conference, {ICMTEL} 2023, Leicester, UK, April 28-29, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {532},
  pages        = {354--361},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50571-3\_25},
  doi          = {10.1007/978-3-031-50571-3\_25},
  timestamp    = {Tue, 30 Apr 2024 13:48:13 +0200},
  biburl       = {https://dblp.org/rec/conf/icmtel/WangFCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict/ChandraTSPTTS23,
  author       = {Rudy Chandra and
                  Togu Novriansyah Turnip and
                  Eka Stephani Sinambela and
                  Goklas Henry Agus Panjaitan and
                  Vivi Nessa Tampubolon and
                  Agnes Mebyolla Turnip and
                  Donianto Siahaan},
  title        = {Mobile Application Security in the Health Care and Finance Sector
                  with Static Analysis (Tools: MobSF)},
  booktitle    = {29th International Conference on Telecommunications, {ICT} 2023, Toba,
                  Indonesia, November 8-9, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICT60153.2023.10374057},
  doi          = {10.1109/ICT60153.2023.10374057},
  timestamp    = {Mon, 22 Jan 2024 20:34:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ict/ChandraTSPTTS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iisa/KormpakisKAMPM23,
  author       = {Georgios Kormpakis and
                  Panagiotis Kapsalis and
                  Konstantinos Alexakis and
                  Zoi Mylona and
                  Sotiris Pelekis and
                  Vangelis Marinakis},
  editor       = {Nikolaos G. Bourbakis and
                  George A. Tsihrintzis and
                  Maria Virvou},
  title        = {Energy Sector Digitilisation: {A} Security Framework Application for
                  Role-Based Access Management},
  booktitle    = {14th International Conference on Information, Intelligence, Systems
                  {\&} Applications, {IISA} 2023, Volos, Greece, July 10-12, 2023},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IISA59645.2023.10345842},
  doi          = {10.1109/IISA59645.2023.10345842},
  timestamp    = {Fri, 19 Jan 2024 14:45:43 +0100},
  biburl       = {https://dblp.org/rec/conf/iisa/KormpakisKAMPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotais/RahmawatiSSSKH23,
  author       = {Tia Rahmawati and
                  Rama Wijaya Shiddiq and
                  Mochamad Rizal Sumpena and
                  Shendy Setiawan and
                  Nyoman Bogi Aditya Karna and
                  Sofia Naning Hertiana},
  title        = {Web Application Firewall Using Proxy and Security Information and
                  Event Management {(SIEM)} for {OWASP} Cyber Attack Detection},
  booktitle    = {{IEEE} International Conference on Internet of Things and Intelligence
                  Systems, IoTaIS 2023, Bali, Indonesia, November 28-30, 2023},
  pages        = {280--285},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IoTaIS60147.2023.10346051},
  doi          = {10.1109/IOTAIS60147.2023.10346051},
  timestamp    = {Fri, 09 Feb 2024 20:38:53 +0100},
  biburl       = {https://dblp.org/rec/conf/iotais/RahmawatiSSSKH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/ChatzisofroniouMK23,
  author       = {George Chatzisofroniou and
                  Chris Markellos and
                  Panayiotis Kotzanikolaou},
  title        = {Assessing the Security Risks of Medical Mobile Applications},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2023, Gammarth,
                  Tunisia, July 9-12, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISCC58397.2023.10217984},
  doi          = {10.1109/ISCC58397.2023.10217984},
  timestamp    = {Wed, 06 Sep 2023 08:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/iscc/ChatzisofroniouMK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ismict/BorghiniCMRJHPH23,
  author       = {Giacomo Borghini and
                  Stefano Caputo and
                  Lorenzo Mucchi and
                  Adnan Rashid and
                  Sara Jayousi and
                  Matti H{\"{a}}m{\"{a}}l{\"{a}}inen and
                  Tuomas Paso and
                  Marco Hernandez},
  title        = {Security of Wireless Body Area Networks for Healthcare Applications:
                  Comparison between {ETSI} and {IEEE} Approaches},
  booktitle    = {17th {IEEE} International Symposium on Medical Information and Communication
                  Technology, {ISMICT} 2023, Lincoln, NE, USA, May 10-12, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISMICT58261.2023.10152140},
  doi          = {10.1109/ISMICT58261.2023.10152140},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ismict/BorghiniCMRJHPH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec2/YanCGY23,
  author       = {Sun Yan and
                  Luo Cuiyun and
                  Li Guangming and
                  Wu Yin},
  title        = {Research on the Application of Maintenance Sensitivity and Network
                  Reconfiguration in Power Grid Security and Stability Platform},
  booktitle    = {{IEEE} Sustainable Power and Energy Conference, iSPEC 2023, Chongqing,
                  China, November 28-30, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/iSPEC58282.2023.10402845},
  doi          = {10.1109/ISPEC58282.2023.10402845},
  timestamp    = {Thu, 22 Feb 2024 20:17:11 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec2/YanCGY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itnac/AliGLD23,
  author       = {Belal Ali and
                  Mark A. Gregory and
                  Shuo Li and
                  Omar Amjad Dib},
  title        = {Zero Trust Security Framework for 5G {MEC} Applications: Evaluating
                  {UE} Dynamic Network Behaviour},
  booktitle    = {33rd International Telecommunication Networks and Applications Conference,
                  {ITNAC} 2023, Melbourne, Australia, November 29 - Dec. 1, 2023},
  pages        = {140--144},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ITNAC59571.2023.10368551},
  doi          = {10.1109/ITNAC59571.2023.10368551},
  timestamp    = {Mon, 22 Jan 2024 20:34:15 +0100},
  biburl       = {https://dblp.org/rec/conf/itnac/AliGLD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itnac/KasturiLPL23,
  author       = {Santanam Kasturi and
                  Xiaolong Li and
                  John Pickard and
                  Peng Li},
  title        = {Understanding Statistical Correlation of Application Security Vulnerability
                  Data from Detection and Monitoring Tools},
  booktitle    = {33rd International Telecommunication Networks and Applications Conference,
                  {ITNAC} 2023, Melbourne, Australia, November 29 - Dec. 1, 2023},
  pages        = {289--296},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ITNAC59571.2023.10368476},
  doi          = {10.1109/ITNAC59571.2023.10368476},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itnac/KasturiLPL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mipro/KaniskiDK23,
  author       = {Matija Kaniski and
                  Jasminka Dobsa and
                  Dragutin Kermek},
  editor       = {Dragan Cisic and
                  Neven Vrcek and
                  Marko Koricic and
                  Vera Gradisnik and
                  Karolj Skala and
                  Zeljka Car and
                  Marina Cicin{-}Sain and
                  Snjezana Babic and
                  Vlado Sruk and
                  Dejan Skvorc and
                  Alan Jovic and
                  Stjepan Gros and
                  Boris Vrdoljak and
                  Edvard Tijan and
                  Tihomir Katulic and
                  Juraj Petrovic and
                  Tihana Galinac Grbac and
                  Lovro Bozicevic},
  title        = {Deep Learning within the Web Application Security Scope - Literature
                  Review},
  booktitle    = {46th {MIPRO} {ICT} and Electronics Convention, {MIPRO} 2023, Opatija,
                  Croatia, May 22-26, 2023},
  pages        = {1195--1200},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/MIPRO57284.2023.10159847},
  doi          = {10.23919/MIPRO57284.2023.10159847},
  timestamp    = {Thu, 13 Jul 2023 08:42:06 +0200},
  biburl       = {https://dblp.org/rec/conf/mipro/KaniskiDK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mipro/MilenkovicNCP23,
  author       = {Melita Milenkovic and
                  Robertina Nikolic and
                  Silvestar Celan and
                  Paula Petrosanec},
  editor       = {Dragan Cisic and
                  Neven Vrcek and
                  Marko Koricic and
                  Vera Gradisnik and
                  Karolj Skala and
                  Zeljka Car and
                  Marina Cicin{-}Sain and
                  Snjezana Babic and
                  Vlado Sruk and
                  Dejan Skvorc and
                  Alan Jovic and
                  Stjepan Gros and
                  Boris Vrdoljak and
                  Edvard Tijan and
                  Tihomir Katulic and
                  Juraj Petrovic and
                  Tihana Galinac Grbac and
                  Lovro Bozicevic},
  title        = {Analysis of IoT Devices Security for Household Applications},
  booktitle    = {46th {MIPRO} {ICT} and Electronics Convention, {MIPRO} 2023, Opatija,
                  Croatia, May 22-26, 2023},
  pages        = {1490--1495},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/MIPRO57284.2023.10159881},
  doi          = {10.23919/MIPRO57284.2023.10159881},
  timestamp    = {Thu, 13 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mipro/MilenkovicNCP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/KecskemetiGVL23,
  author       = {K{\'{a}}roly Kecskem{\'{e}}ti and
                  Csaba Gy{\"{o}}rgyi and
                  P{\'{e}}ter V{\"{o}}r{\"{o}}s and
                  S{\'{a}}ndor Laki},
  editor       = {Jie Wu and
                  Suresh Subramaniam and
                  Bo Ji and
                  Carla{-}Fabiana Chiasserini},
  title        = {In-Network Security Applications with {P4RROT}},
  booktitle    = {Proceedings of the Twenty-fourth International Symposium on Theory,
                  Algorithmic Foundations, and Protocol Design for Mobile Networks and
                  Mobile Computing, MobiHoc 2023, Washington, DC, USA, October 23-26,
                  2023},
  pages        = {346--351},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3565287.3617612},
  doi          = {10.1145/3565287.3617612},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobihoc/KecskemetiGVL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msr/SchneiderOCS23,
  author       = {Simon Schneider and
                  Tufan {\"{O}}zen and
                  Michael Chen and
                  Riccardo Scandariato},
  title        = {microSecEnD: {A} Dataset of Security-Enriched Dataflow Diagrams for
                  Microservice Applications},
  booktitle    = {20th {IEEE/ACM} International Conference on Mining Software Repositories,
                  {MSR} 2023, Melbourne, Australia, May 15-16, 2023},
  pages        = {125--129},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSR59073.2023.00030},
  doi          = {10.1109/MSR59073.2023.00030},
  timestamp    = {Wed, 19 Jul 2023 17:21:49 +0200},
  biburl       = {https://dblp.org/rec/conf/msr/SchneiderOCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msr/ZeroualiOR23,
  author       = {Ahmed Zerouali and
                  Ruben Opdebeeck and
                  Coen De Roover},
  title        = {Helm Charts for Kubernetes Applications: Evolution, Outdatedness and
                  Security Risks},
  booktitle    = {20th {IEEE/ACM} International Conference on Mining Software Repositories,
                  {MSR} 2023, Melbourne, Australia, May 15-16, 2023},
  pages        = {523--533},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSR59073.2023.00078},
  doi          = {10.1109/MSR59073.2023.00078},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/msr/ZeroualiOR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChenLC0L23,
  author       = {An Chen and
                  Jiho Lee and
                  Basanta Chaulagain and
                  Yonghwi Kwon and
                  Kyu Hyung Lee},
  title        = {SynthDB: Synthesizing Database via Program Analysis for Security Testing
                  of Web Applications},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/synthdb-synthesizing-database-via-program-analysis-for-security-testing-of-web-applications/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ChenLC0L23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Jin0CD0W23,
  author       = {Zihao Jin and
                  Shuo Chen and
                  Yang Chen and
                  Haixin Duan and
                  Jianjun Chen and
                  Jianping Wu},
  title        = {A Security Study about Electron Applications and a Programming Methodology
                  to Tame {DOM} Functionalities},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/a-security-study-about-electron-applications-and-a-programming-methodology-to-tame-dom-functionalities/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/Jin0CD0W23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pads/ChenHQJ23,
  author       = {Gong Chen and
                  Zheng Hu and
                  Yanfeng Qu and
                  Dong Jin},
  editor       = {Margaret L. Loper and
                  Dong (Kevin) Jin and
                  Christopher D. Carothers},
  title        = {Combining Power Simulation and Programmable Network Emulation for
                  Smart Grid Security Application Evaluation},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSIM} Conference on Principles of
                  Advanced Discrete Simulation, {SIGSIM-PADS} 2023, Orlando, FL, USA,
                  June 21-23, 2023},
  pages        = {52--53},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3573900.3593633},
  doi          = {10.1145/3573900.3593633},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pads/ChenHQJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sds/FarukC23,
  author       = {Md. Jobair Hossain Faruk and
                  Jerry Q. Cheng},
  editor       = {Muhannad Quwaider and
                  Yaser Jararweh and
                  Elhadj Benkhelifa and
                  Jaime Lloret},
  title        = {Integration of Blockchain in Computer Networking: Overview, Applications,
                  and Future Perspectives for Software-defined Networking (SDN), Network
                  Security, and Protocols},
  booktitle    = {Tenth International Conference on Software Defined Systems, {SDS}
                  2023, San Antonio, TX, USA, October 23-25, 2023},
  pages        = {20--27},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SDS59856.2023.10329025},
  doi          = {10.1109/SDS59856.2023.10329025},
  timestamp    = {Thu, 04 Jan 2024 08:13:43 +0100},
  biburl       = {https://dblp.org/rec/conf/sds/FarukC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/ShuvoHMS23,
  author       = {Md. Wasiuddin Pathan Shuvo and
                  Md. Nazmul Hoq and
                  Suryadipta Majumdar and
                  Paria Shirani},
  editor       = {Felix G{\"{u}}nther and
                  Julia Hesse},
  title        = {On Reducing Underutilization of Security Standards by Deriving Actionable
                  Rules: An Application to IoT},
  booktitle    = {Security Standardisation Research - 8th International Conference,
                  {SSR} 2023, Lyon, France, April 22-23, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13895},
  pages        = {103--128},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30731-7\_5},
  doi          = {10.1007/978-3-031-30731-7\_5},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/ShuvoHMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/LiCFFLLLC23,
  author       = {Kaixuan Li and
                  Sen Chen and
                  Lingling Fan and
                  Ruitao Feng and
                  Han Liu and
                  Chengwei Liu and
                  Yang Liu and
                  Yixiang Chen},
  editor       = {Satish Chandra and
                  Kelly Blincoe and
                  Paolo Tonella},
  title        = {Comparison and Evaluation on Static Application Security Testing {(SAST)}
                  Tools for Java},
  booktitle    = {Proceedings of the 31st {ACM} Joint European Software Engineering
                  Conference and Symposium on the Foundations of Software Engineering,
                  {ESEC/FSE} 2023, San Francisco, CA, USA, December 3-9, 2023},
  pages        = {921--933},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3611643.3616262},
  doi          = {10.1145/3611643.3616262},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/LiCFFLLLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soli/BalachandranKLEK23,
  author       = {Vivek Balachandran and
                  Ryan Fraser Kirwan and
                  Peter Loh and
                  Mohamed Riaz Ebrahim and
                  Ravishanker Kusuma},
  title        = {{ASAP:} Application Security Assessment Protocol},
  booktitle    = {{IEEE} International Conference on Service Operations and Logistics,
                  and Informatics, {SOLI} 2023, Singapore, December 11-13, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SOLI60636.2023.10425121},
  doi          = {10.1109/SOLI60636.2023.10425121},
  timestamp    = {Thu, 29 Feb 2024 20:53:04 +0100},
  biburl       = {https://dblp.org/rec/conf/soli/BalachandranKLEK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spcnc/BinTLYL23,
  author       = {Dongmei Bin and
                  Fuchuan Tang and
                  Yangguang Lin and
                  Chunyan Yang and
                  Ying Ling},
  title        = {Application of Zero Trust Security Architecture in Power Communication
                  Network Security Management System},
  booktitle    = {Proceedings of the 2nd International Conference on Signal Processing,
                  Computer Networks and Communications, {SPCNC} 2023, Xiamen, China,
                  December 8-10, 2023},
  pages        = {397--401},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3654446.3654517},
  doi          = {10.1145/3654446.3654517},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spcnc/BinTLYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spcnc/LiWGL23,
  author       = {Xiaolong Li and
                  Kongpeng Wei and
                  Hongbin Gu and
                  Bo Liu},
  title        = {Research and Application of Network Security Situational Awareness
                  Technology Based on Ridge Regression},
  booktitle    = {Proceedings of the 2nd International Conference on Signal Processing,
                  Computer Networks and Communications, {SPCNC} 2023, Xiamen, China,
                  December 8-10, 2023},
  pages        = {169--173},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3654446.3654476},
  doi          = {10.1145/3654446.3654476},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spcnc/LiWGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spcnc/WangZY23,
  author       = {Nan Wang and
                  Qinghua Zhang and
                  Xu Yang},
  title        = {Discussion on the Application of Tracking Codes on Color Laser Printouts
                  in Information Security and Document Anti-counterfeiting},
  booktitle    = {Proceedings of the 2nd International Conference on Signal Processing,
                  Computer Networks and Communications, {SPCNC} 2023, Xiamen, China,
                  December 8-10, 2023},
  pages        = {378--383},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3654446.3654514},
  doi          = {10.1145/3654446.3654514},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spcnc/WangZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssci/SiddiqueHRGSG23,
  author       = {Sunzida Siddique and
                  Mohd Ariful Haque and
                  Rakib Hossain Rifat and
                  Roy George and
                  Khalil Shujaee and
                  Kishor Datta Gupta},
  title        = {Cyber Security Issues in the Industrial Applications of Digital Twins},
  booktitle    = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2023,
                  Mexico City, Mexico, December 5-8, 2023},
  pages        = {873--878},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SSCI52147.2023.10371850},
  doi          = {10.1109/SSCI52147.2023.10371850},
  timestamp    = {Mon, 15 Jan 2024 21:26:31 +0100},
  biburl       = {https://dblp.org/rec/conf/ssci/SiddiqueHRGSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucami/RussoLGM23,
  author       = {Enrico Russo and
                  Giacomo Longo and
                  Meriem Guerar and
                  Alessio Merlo},
  editor       = {Jos{\'{e}} Bravo and
                  Gabriel Urz{\'{a}}iz},
  title        = {Cloud-Native Application Security Training and Testing with Cyber
                  Ranges},
  booktitle    = {Proceedings of the 15th International Conference on Ubiquitous Computing
                  {\&} Ambient Intelligence (UCAmI 2023) - Volume 3, Riviera Maya,
                  Mexico, 28-29 November, 2023},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {841},
  pages        = {205--216},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48590-9\_20},
  doi          = {10.1007/978-3-031-48590-9\_20},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ucami/RussoLGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AzadJTEN23,
  author       = {Babak Amin Azad and
                  Rasoul Jahanshahi and
                  Chris Tsoukaladelis and
                  Manuel Egele and
                  Nick Nikiforakis},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {AnimateDead: Debloating Web Applications Using Concolic Execution},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5575--5591},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/azad},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AzadJTEN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Ding023,
  author       = {Changchang Ding and
                  Yan Huang},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Dubhe: Succinct Zero-Knowledge Proofs for Standard {AES} and related
                  Applications},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4373--4390},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/ding-changchang},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Ding023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JahanshahiANE23,
  author       = {Rasoul Jahanshahi and
                  Babak Amin Azad and
                  Nick Nikiforakis and
                  Manuel Egele},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Minimalist: Semi-automated Debloating of {PHP} Web Applications through
                  Static Analysis},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5557--5573},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/jahanshahi},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/JahanshahiANE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Jegan0BS23,
  author       = {Deepak Sirone Jegan and
                  Liang Wang and
                  Siddhant Bhagat and
                  Michael M. Swift},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Guarding Serverless Applications with Kalium},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4087--4104},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/jegan},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Jegan0BS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KassarCB23,
  author       = {Feras Al Kassar and
                  Luca Compagna and
                  Davide Balzarotti},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {{WHIP:} Improving Static Vulnerability Detection in Web Application
                  by Forcing tools to Collaborate},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {6079--6096},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/al-kassar},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KassarCB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KochAJ23,
  author       = {Simon Koch and
                  Benjamin Altpeter and
                  Martin Johns},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {The {OK} Is Not Enough: {A} Large Scale Study of Consent Dialogs in
                  Smartphone Applications},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5467--5484},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/koch},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KochAJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Li0ZSSQ23,
  author       = {Guoren Li and
                  Hang Zhang and
                  Jinmeng Zhou and
                  Wenbo Shen and
                  Yulei Sui and
                  Zhiyun Qian},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {A Hybrid Alias Analysis and Its Application to Global Variable Protection
                  in the Linux Kernel},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4211--4228},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/li-guoren},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Li0ZSSQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiDHHZS23,
  author       = {Yun Li and
                  Yufei Duan and
                  Zhicong Huang and
                  Cheng Hong and
                  Chao Zhang and
                  Yifan Song},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Efficient 3PC for Binary Circuits with Application to Maliciously-Secure
                  {DNN} Inference},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5377--5394},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/li-yun},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiDHHZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Wu0ZTMW23,
  author       = {Yafei Wu and
                  Cong Sun and
                  Dongrui Zeng and
                  Gang Tan and
                  Siqi Ma and
                  Peicheng Wang},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {LibScan: Towards More Precise Third-Party Library Identification for
                  Android Applications},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3385--3402},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/wu-yafei},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Wu0ZTMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YaoFKASS23,
  author       = {Mingxuan Yao and
                  Jonathan Fuller and
                  Ranjita Pai Kasturi and
                  Saumya Agarwal and
                  Amit Kumar Sikder and
                  Brendan Saltaformaggio},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Hiding in Plain Sight: An Empirical Study of Web Application Abuse
                  in Malware},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {6115--6132},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/yao-mingxuan},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/YaoFKASS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Yu0Q00X23,
  author       = {Jiahao Yu and
                  Wenbo Guo and
                  Qi Qin and
                  Gang Wang and
                  Ting Wang and
                  Xinyu Xing},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {{AIRS:} Explanation for Deep Reinforcement Learning based Security
                  Applications},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {7375--7392},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/yu-jiahao},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Yu0Q00X23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YurekX0023,
  author       = {Thomas Yurek and
                  Zhuolun Xiang and
                  Yu Xia and
                  Andrew Miller},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Long Live The Honey Badger: Robust Asynchronous {DPSS} and its Applications},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5413--5430},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/yurek},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/YurekX0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vmcai/TiraboschiRR23,
  author       = {Ignacio Tiraboschi and
                  Tamara Rezk and
                  Xavier Rival},
  editor       = {Cezara Dragoi and
                  Michael Emmi and
                  Jingbo Wang},
  title        = {Sound Symbolic Execution via Abstract Interpretation and Its Application
                  to Security},
  booktitle    = {Verification, Model Checking, and Abstract Interpretation - 24th International
                  Conference, {VMCAI} 2023, Boston, MA, USA, January 16-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13881},
  pages        = {267--295},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-24950-1\_13},
  doi          = {10.1007/978-3-031-24950-1\_13},
  timestamp    = {Wed, 29 May 2024 09:08:46 +0200},
  biburl       = {https://dblp.org/rec/conf/vmcai/TiraboschiRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wfcs/HosseiniFBKSS23,
  author       = {Ali Mohammad Hosseini and
                  Clara Fischer and
                  Mukund Bhole and
                  Wolfgang Kastner and
                  Thilo Sauter and
                  Sebastian Schlund},
  title        = {A Safety and Security Requirements Management Methodology in Reconfigurable
                  Collaborative Human-Robot Application},
  booktitle    = {19th {IEEE} International Conference on Factory Communication Systems,
                  {WFCS} 2023, Pavia, Italy, April 26-28, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WFCS57264.2023.10144233},
  doi          = {10.1109/WFCS57264.2023.10144233},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wfcs/HosseiniFBKSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wincom/RguigEOH23,
  author       = {Bouchra Rguig and
                  Brahim Es{-}Sousy and
                  Said Ouhmi and
                  Khalid Housni},
  editor       = {Khalil Ibrahimi and
                  Mohamed El{-}Kamili and
                  Abdellatif Kobbane and
                  Ibraheem Shayea},
  title        = {IoT Security Based on Smart Contracts: Classification of Algorithms,
                  Complexity, Robustness and Fields of Application},
  booktitle    = {10th International Conference on Wireless Networks and Mobile Communications,
                  {WINCOM} 2023, Istanbul, Turkey, October 26-28, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WINCOM59760.2023.10322936},
  doi          = {10.1109/WINCOM59760.2023.10322936},
  timestamp    = {Mon, 01 Jan 2024 01:38:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wincom/RguigEOH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worldcist/ConvertiniDILSV23,
  author       = {Vito Nicola Convertini and
                  Vincenzo Dentamaro and
                  Donato Impedovo and
                  Ugo Lopez and
                  Michele Scalera and
                  Andrea Viccari},
  editor       = {{\'{A}}lvaro Rocha and
                  Hojjat Adeli and
                  Gintautas Dzemyda and
                  Fernando Moreira and
                  Valentina Colla},
  title        = {{BOOGIE:} {A} New Blockchain Application for Health Certificate Security},
  booktitle    = {Information Systems and Technologies - WorldCIST 2023, Volume 4, Pisa,
                  Italy, April 4-6, 2023},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {802},
  pages        = {371--380},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45651-0\_37},
  doi          = {10.1007/978-3-031-45651-0\_37},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/worldcist/ConvertiniDILSV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpmc/TungLCLC23,
  author       = {Yi{-}Chih Tung and
                  En{-}Cheng Liou and
                  Chung{-}Hsiang Cheng and
                  Tzu{-}Hang Lin and
                  Shu{-}Min Chuang},
  title        = {Closed-Loop Security Management for Developing {O-RAN} Infrastructure
                  and {B5G} {RIC} Applications},
  booktitle    = {26th International Symposium on Wireless Personal Multimedia Communications,
                  {WPMC} 2023, Tampa, FL, USA, November 19-22, 2023},
  pages        = {278--281},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WPMC59531.2023.10338980},
  doi          = {10.1109/WPMC59531.2023.10338980},
  timestamp    = {Wed, 17 Jan 2024 10:56:10 +0100},
  biburl       = {https://dblp.org/rec/conf/wpmc/TungLCLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsse/TanLGJLT23,
  author       = {Su{-}Mae Tan and
                  Tze Wei Liew and
                  Chin Lay Gan and
                  Hasmida Jamaluddin and
                  Yi Yong Lee and
                  James Yong Zheng Tey},
  title        = {What drives the continuous adoption of mobile stock trading applications
                  among Gen-Z traders? An investigation of the TAM, social influence,
                  trust, and perceived security},
  booktitle    = {The 5th World Symposium on Software Engineering, {WSSE} 2023, Tokyo,
                  Japan, September 22-24, 2023},
  pages        = {96--103},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3631991.3632006},
  doi          = {10.1145/3631991.3632006},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wsse/TanLGJLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/crc/23/BugliesiCR23,
  author       = {Michele Bugliesi and
                  Stefano Calzavara and
                  Alvise Rabitti},
  editor       = {Sedat Akleylek and
                  Besik Dundua},
  title        = {Cryptographic Web Applications: from Security Engineering to Formal
                  Analysis},
  booktitle    = {Handbook of Formal Analysis and Verification in Cryptography},
  pages        = {275--318},
  publisher    = {{CRC} Press},
  year         = {2023},
  url          = {https://doi.org/10.1201/9781003090052-6},
  doi          = {10.1201/9781003090052-6},
  timestamp    = {Mon, 25 Sep 2023 12:19:41 +0200},
  biburl       = {https://dblp.org/rec/books/crc/23/BugliesiCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/23/BhattacharjyaS23,
  author       = {Sairath Bhattacharjya and
                  Hossein Saiedian},
  editor       = {Kevin Daimi and
                  Abeer Alsadoon and
                  Cathryn Peoples and
                  Nour El Madhoun},
  title        = {End-to-End Security for IoT Communications: {A} Practical Implementation},
  booktitle    = {Emerging Trends in Cybersecurity Applications},
  pages        = {21--43},
  publisher    = {Springer International Publishing},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-09640-2\_2},
  doi          = {10.1007/978-3-031-09640-2\_2},
  timestamp    = {Wed, 22 Feb 2023 15:20:25 +0100},
  biburl       = {https://dblp.org/rec/books/sp/23/BhattacharjyaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/23/ColombWIA23,
  author       = {Yvette Colomb and
                  Peter White and
                  Rafiqul Islam and
                  Abeer Alsadoon},
  editor       = {Kevin Daimi and
                  Abeer Alsadoon and
                  Cathryn Peoples and
                  Nour El Madhoun},
  title        = {Applying Zero Trust Architecture and Probability-Based Authentication
                  to Preserve Security and Privacy of Data in the Cloud},
  booktitle    = {Emerging Trends in Cybersecurity Applications},
  pages        = {137--169},
  publisher    = {Springer International Publishing},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-09640-2\_7},
  doi          = {10.1007/978-3-031-09640-2\_7},
  timestamp    = {Sat, 15 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/23/ColombWIA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/23/RealistaPSNA23,
  author       = {Nuno Realista and
                  Francisco Palma and
                  Carlos Serr{\~{a}}o and
                  Lu{\'{\i}}s Nunes and
                  Ana de Almeida},
  editor       = {Kevin Daimi and
                  Abeer Alsadoon and
                  Cathryn Peoples and
                  Nour El Madhoun},
  title        = {Improving Android Application Quality Through Extendable, Automated
                  Security Testing},
  booktitle    = {Emerging Trends in Cybersecurity Applications},
  pages        = {251--274},
  publisher    = {Springer International Publishing},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-09640-2\_12},
  doi          = {10.1007/978-3-031-09640-2\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/23/RealistaPSNA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/Al-DosariHB23,
  author       = {Khalifa Al{-}Dosari and
                  Ziad Hunaiti and
                  Wamadeva Balachandran},
  editor       = {Muhammad Alshurideh and
                  Barween Hikmat Al Kurdi and
                  Ra'ed Masa'deh and
                  Haitham M. Alzoubi and
                  Said A. Salloum},
  title        = {A Review of Civilian Drones Systems, Applications, Benefits, Safety,
                  and Security Challenges},
  booktitle    = {The Effect of Information Technology on Business and Marketing Intelligence
                  Systems},
  series       = {Studies in Computational Intelligence},
  volume       = {1056},
  pages        = {793--812},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-12382-5\_43},
  doi          = {10.1007/978-3-031-12382-5\_43},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sci/Al-DosariHB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2023,
  title        = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106},
  doi          = {10.1145/3627106},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2023-1,
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14438},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8721-4},
  doi          = {10.1007/978-981-99-8721-4},
  isbn         = {978-981-99-8720-7},
  timestamp    = {Sun, 07 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2023-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2023-2,
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14439},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8724-5},
  doi          = {10.1007/978-981-99-8724-5},
  isbn         = {978-981-99-8723-8},
  timestamp    = {Sun, 07 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2023-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2023-3,
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14440},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8727-6},
  doi          = {10.1007/978-981-99-8727-6},
  isbn         = {978-981-99-8726-9},
  timestamp    = {Sun, 07 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2023-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2023-4,
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14441},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8730-6},
  doi          = {10.1007/978-981-99-8730-6},
  isbn         = {978-981-99-8729-0},
  timestamp    = {Sun, 07 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2023-4.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2023-5,
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14442},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8733-7},
  doi          = {10.1007/978-981-99-8733-7},
  isbn         = {978-981-99-8732-0},
  timestamp    = {Sun, 07 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2023-5.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2023-6,
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {VI}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14443},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8736-8},
  doi          = {10.1007/978-981-99-8736-8},
  isbn         = {978-981-99-8735-1},
  timestamp    = {Sun, 07 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2023-6.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2023-7,
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {VII}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14444},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8739-9},
  doi          = {10.1007/978-981-99-8739-9},
  isbn         = {978-981-99-8738-2},
  timestamp    = {Sun, 07 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2023-7.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2023-8,
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {VIII}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14445},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8742-9},
  doi          = {10.1007/978-981-99-8742-9},
  isbn         = {978-981-99-8741-2},
  timestamp    = {Sun, 07 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2023-8.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/atis/2022,
  editor       = {Srikanth Prabhu and
                  Shiva Raj Pokhrel and
                  Gang Li},
  title        = {Applications and Techniques in Information Security - 13th International
                  Conference, {ATIS} 2022, Manipal, India, December 30-31, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1804},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-2264-2},
  doi          = {10.1007/978-981-99-2264-2},
  isbn         = {978-981-99-2263-5},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cesar/2022,
  editor       = {Gurvan le Guernic},
  title        = {Proceedings of the 29th Computer {\&} Electronics Security Application
                  Rendezvous co-located with the 7th European Cyber Week {(ECW} 2022),
                  Rennes, France, November 15-16, 2022},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3329},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {http://ceur-ws.org/Vol-3329},
  urn          = {urn:nbn:de:0074-3329-8},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cesar/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2023,
  editor       = {Mohamed Shehab and
                  Maribel Fern{\'{a}}ndez and
                  Ninghui Li},
  title        = {Proceedings of the Thirteenth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26,
                  2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577923},
  doi          = {10.1145/3577923},
  timestamp    = {Mon, 24 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2023,
  editor       = {Vijayalakshmi Atluri and
                  Anna Lisa Ferrara},
  title        = {Data and Applications Security and Privacy {XXXVII} - 37th Annual
                  {IFIP} {WG} 11.3 Conference, DBSec 2023, Sophia-Antipolis, France,
                  July 19-21, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13942},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-37586-6},
  doi          = {10.1007/978-3-031-37586-6},
  isbn         = {978-3-031-37585-9},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdse/2023,
  editor       = {Tran Khanh Dang and
                  Josef K{\"{u}}ng and
                  Tai M. Chung},
  title        = {Future Data and Security Engineering. Big Data, Security and Privacy,
                  Smart City and Industry 4.0 Applications - 10th International Conference,
                  {FDSE} 2023, Da Nang, Vietnam, November 22-24, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1925},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8296-7},
  doi          = {10.1007/978-981-99-8296-7},
  isbn         = {978-981-99-8295-0},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdse/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tpsisa/2023,
  title        = {5th {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2023, Atlanta,
                  GA, USA, November 1-4, 2023},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/TPS-ISA58951.2023},
  doi          = {10.1109/TPS-ISA58951.2023},
  isbn         = {979-8-3503-2385-6},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tpsisa/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2022,
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-25659-2},
  doi          = {10.1007/978-3-031-25659-2},
  isbn         = {978-3-031-25658-5},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-07783,
  author       = {Ignacio Tiraboschi and
                  Tamara Rezk and
                  Xavier Rival},
  title        = {Sound Symbolic Execution via Abstract Interpretation and its Application
                  to Security},
  journal      = {CoRR},
  volume       = {abs/2301.07783},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.07783},
  doi          = {10.48550/ARXIV.2301.07783},
  eprinttype    = {arXiv},
  eprint       = {2301.07783},
  timestamp    = {Thu, 26 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-07783.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-01508,
  author       = {Fangzhou Wang and
                  A. Lee Swindlehurst},
  title        = {Applications of Absorptive Reconfigurable Intelligent Surfaces in
                  Interference Mitigation and Physical Layer Security},
  journal      = {CoRR},
  volume       = {abs/2302.01508},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.01508},
  doi          = {10.48550/ARXIV.2302.01508},
  eprinttype    = {arXiv},
  eprint       = {2302.01508},
  timestamp    = {Thu, 09 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-01508.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-06725,
  author       = {Serhan W. Bahar},
  title        = {Advanced Security Threat Modelling for Blockchain-Based FinTech Applications},
  journal      = {CoRR},
  volume       = {abs/2304.06725},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.06725},
  doi          = {10.48550/ARXIV.2304.06725},
  eprinttype    = {arXiv},
  eprint       = {2304.06725},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-06725.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-09486,
  author       = {Jingjin Li and
                  Chao Chen and
                  Lei Pan and
                  Mostafa Rahimi Azghadi and
                  Hossein Ghodosi and
                  Jun Zhang},
  title        = {Security and Privacy Problems in Voice Assistant Applications: {A}
                  Survey},
  journal      = {CoRR},
  volume       = {abs/2304.09486},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.09486},
  doi          = {10.48550/ARXIV.2304.09486},
  eprinttype    = {arXiv},
  eprint       = {2304.09486},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-09486.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-12769,
  author       = {Simon Schneider and
                  Riccardo Scandariato},
  title        = {Automatic Extraction of Security-Rich Dataflow Diagrams for Microservice
                  Applications written in Java},
  journal      = {CoRR},
  volume       = {abs/2304.12769},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.12769},
  doi          = {10.48550/ARXIV.2304.12769},
  eprinttype    = {arXiv},
  eprint       = {2304.12769},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-12769.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-01936,
  author       = {Georgios Batsis and
                  Ioannis Mademlis and
                  Georgios Th. Papadopoulos},
  title        = {Illicit item detection in X-ray images for security applications},
  journal      = {CoRR},
  volume       = {abs/2305.01936},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.01936},
  doi          = {10.48550/ARXIV.2305.01936},
  eprinttype    = {arXiv},
  eprint       = {2305.01936},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-01936.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-05108,
  author       = {Uchenna Daniel Ani and
                  Jeremy M. Watson and
                  Nilufer Tuptuk and
                  Steve Hailes and
                  Aslam Jawar},
  title        = {Socio-Technical Security Modelling: Analysis of State-of-the-Art,
                  Application, and Maturity in Critical Industrial Infrastructure Environments/Domains},
  journal      = {CoRR},
  volume       = {abs/2305.05108},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.05108},
  doi          = {10.48550/ARXIV.2305.05108},
  eprinttype    = {arXiv},
  eprint       = {2305.05108},
  timestamp    = {Fri, 12 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-05108.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-09261,
  author       = {Beckett LeClair and
                  James McLeod and
                  Lee Ramsay and
                  Mick Warren},
  title        = {Challenges with the Application of Cyber Security for Airworthiness
                  {(CSA)} in Real-World Contexts},
  journal      = {CoRR},
  volume       = {abs/2305.09261},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.09261},
  doi          = {10.48550/ARXIV.2305.09261},
  eprinttype    = {arXiv},
  eprint       = {2305.09261},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-09261.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-11781,
  author       = {Qingkai Shi and
                  Junyang Shao and
                  Yapeng Ye and
                  Mingwei Zheng and
                  Xiangyu Zhang},
  title        = {Lifting Network Protocol Implementation to Precise Format Specification
                  with Security Applications},
  journal      = {CoRR},
  volume       = {abs/2305.11781},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.11781},
  doi          = {10.48550/ARXIV.2305.11781},
  eprinttype    = {arXiv},
  eprint       = {2305.11781},
  timestamp    = {Thu, 25 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-11781.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-16473,
  author       = {Muhammad Adil and
                  Houbing Song and
                  Muhammad Khurram Khan and
                  Ahmed Farouk and
                  Zhanpeng Jin},
  title        = {5G/6G-Enabled Metaverse Technologies: Taxonomy, Applications, and
                  Open Security Challenges with Future Research Directions},
  journal      = {CoRR},
  volume       = {abs/2305.16473},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.16473},
  doi          = {10.48550/ARXIV.2305.16473},
  eprinttype    = {arXiv},
  eprint       = {2305.16473},
  timestamp    = {Wed, 07 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-16473.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-12516,
  author       = {Souvik Das and
                  Priyanka Dey and
                  Debasish Chatterjee},
  title        = {Separability of State Trajectories and its Applications to Security
                  of Cyber-Physical Systems},
  journal      = {CoRR},
  volume       = {abs/2306.12516},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.12516},
  doi          = {10.48550/ARXIV.2306.12516},
  eprinttype    = {arXiv},
  eprint       = {2306.12516},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-12516.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-15588,
  author       = {Samuel C. Hollifield and
                  Pablo Moriano and
                  William L. Lambert and
                  Joel Asiamah and
                  Isaac Sikkema and
                  Michael D. Iannacone},
  title        = {Developing and Deploying Security Applications for In-Vehicle Networks},
  journal      = {CoRR},
  volume       = {abs/2306.15588},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.15588},
  doi          = {10.48550/ARXIV.2306.15588},
  eprinttype    = {arXiv},
  eprint       = {2306.15588},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-15588.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-16540,
  author       = {Joel H{\"{o}}glund and
                  Shahid Raza},
  title        = {{BLEND:} Efficient and blended IoT data storage and communication
                  with application layer security},
  journal      = {CoRR},
  volume       = {abs/2306.16540},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.16540},
  doi          = {10.48550/ARXIV.2306.16540},
  eprinttype    = {arXiv},
  eprint       = {2306.16540},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-16540.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-08840,
  author       = {Zeyang Jia and
                  Eli Ben{-}Michael and
                  Kosuke Imai},
  title        = {Bayesian Safe Policy Learning with Chance Constrained Optimization:
                  Application to Military Security Assessment during the Vietnam War},
  journal      = {CoRR},
  volume       = {abs/2307.08840},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.08840},
  doi          = {10.48550/ARXIV.2307.08840},
  eprinttype    = {arXiv},
  eprint       = {2307.08840},
  timestamp    = {Tue, 25 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-08840.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-10342,
  author       = {Khadija Manzoor and
                  Umara Noor and
                  Zahid Rashid},
  title        = {NFT-Based Blockchain-Oriented Security Framework for Metaverse Applications},
  journal      = {CoRR},
  volume       = {abs/2307.10342},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.10342},
  doi          = {10.48550/ARXIV.2307.10342},
  eprinttype    = {arXiv},
  eprint       = {2307.10342},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-10342.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-12488,
  author       = {Zhilong Wang and
                  Lan Zhang and
                  Peng Liu},
  title        = {ChatGPT for Software Security: Exploring the Strengths and Limitations
                  of ChatGPT in the Security Applications},
  journal      = {CoRR},
  volume       = {abs/2307.12488},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.12488},
  doi          = {10.48550/ARXIV.2307.12488},
  eprinttype    = {arXiv},
  eprint       = {2307.12488},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-12488.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-10613,
  author       = {Jasper Surmont and
                  Weihong Wang and
                  Tom Van Cutsem},
  title        = {Static Application Security Testing of Consensus-Critical Code in
                  the Cosmos Network},
  journal      = {CoRR},
  volume       = {abs/2308.10613},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.10613},
  doi          = {10.48550/ARXIV.2308.10613},
  eprinttype    = {arXiv},
  eprint       = {2308.10613},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-10613.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-14434,
  author       = {Atieh Bakhshandeh and
                  Abdalsamad Keramatfar and
                  Amir Norouzi and
                  Mohammad Mahdi Chekidehkhoun},
  title        = {Using ChatGPT as a Static Application Security Testing Tool},
  journal      = {CoRR},
  volume       = {abs/2308.14434},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.14434},
  doi          = {10.48550/ARXIV.2308.14434},
  eprinttype    = {arXiv},
  eprint       = {2308.14434},
  timestamp    = {Fri, 01 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-14434.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-14741,
  author       = {Yuvaray Athur Raghuvir and
                  Senthil Govindarajan and
                  Sanjeevi Vijayakumar and
                  Pradeep Yadlapalli and
                  Fabio Di Troia},
  title        = {Advancement on Security Applications of Private Intersection Sum Protocol},
  journal      = {CoRR},
  volume       = {abs/2308.14741},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.14741},
  doi          = {10.48550/ARXIV.2308.14741},
  eprinttype    = {arXiv},
  eprint       = {2308.14741},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-14741.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-02707,
  author       = {Shams Forruque Ahmed and
                  Shanjana Shuravi and
                  Afsana Bhuyian and
                  Shaila Afrin and
                  Aanushka Mehjabin and
                  Sweety Angela Kuldeep and
                  Md. Sakib Bin Alam and
                  Amir H. Gandomi},
  title        = {Navigating the IoT landscape: Unraveling forensics, security issues,
                  applications, research challenges, and future},
  journal      = {CoRR},
  volume       = {abs/2309.02707},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.02707},
  doi          = {10.48550/ARXIV.2309.02707},
  eprinttype    = {arXiv},
  eprint       = {2309.02707},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-02707.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-05525,
  author       = {Shivraj Hanumant Gonde and
                  Christoph Frisch and
                  Svetoslav Duhovnikov and
                  Martin Kubisch and
                  Thomas Meyerhoff and
                  Dominic Schupke},
  title        = {Physical Layer Security in a Private 5G Network for Industrial and
                  Mobility Application},
  journal      = {CoRR},
  volume       = {abs/2310.05525},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.05525},
  doi          = {10.48550/ARXIV.2310.05525},
  eprinttype    = {arXiv},
  eprint       = {2310.05525},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-05525.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-12037,
  author       = {Saleh Darzi and
                  Kasra Ahmadi and
                  Saeed Aghapour and
                  Attila Altay Yavuz and
                  Mehran Mozaffari Kermani},
  title        = {Envisioning the Future of Cyber Security in Post-Quantum Era: {A}
                  Survey on {PQ} Standardization, Applications, Challenges and Opportunities},
  journal      = {CoRR},
  volume       = {abs/2310.12037},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.12037},
  doi          = {10.48550/ARXIV.2310.12037},
  eprinttype    = {arXiv},
  eprint       = {2310.12037},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-12037.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-19459,
  author       = {Amir Pakmehr and
                  Andreas A{\ss}muth and
                  Christoph P. Neumann and
                  Gerald Pirkl},
  title        = {Security Challenges for Cloud or Fog Computing-Based {AI} Applications},
  journal      = {CoRR},
  volume       = {abs/2310.19459},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.19459},
  doi          = {10.48550/ARXIV.2310.19459},
  eprinttype    = {arXiv},
  eprint       = {2310.19459},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-19459.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-00842,
  author       = {Naresh Kshetri and
                  James Hutson and
                  Revathy G},
  title        = {healthAIChain: Improving security and safety using Blockchain Technology
                  applications in AI-based healthcare systems},
  journal      = {CoRR},
  volume       = {abs/2311.00842},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.00842},
  doi          = {10.48550/ARXIV.2311.00842},
  eprinttype    = {arXiv},
  eprint       = {2311.00842},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-00842.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-03723,
  author       = {Alexandru Cojocaru and
                  Juan A. Garay and
                  Fang Song},
  title        = {Generalized Hybrid Search and Applications to Blockchain and Hash
                  Function Security},
  journal      = {CoRR},
  volume       = {abs/2311.03723},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.03723},
  doi          = {10.48550/ARXIV.2311.03723},
  eprinttype    = {arXiv},
  eprint       = {2311.03723},
  timestamp    = {Thu, 16 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-03723.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-10450,
  author       = {Rui Ventura and
                  Daniel Jos{\'{e}} Franco and
                  Omar Khasro Akram},
  title        = {A Novel {VAPT} Algorithm: Enhancing Web Application Security Trough
                  {OWASP} top 10 Optimization},
  journal      = {CoRR},
  volume       = {abs/2311.10450},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.10450},
  doi          = {10.48550/ARXIV.2311.10450},
  eprinttype    = {arXiv},
  eprint       = {2311.10450},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-10450.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-05275,
  author       = {Fangzhou Wu and
                  Qingzhao Zhang and
                  Ati Priya Bajaj and
                  Tiffany Bao and
                  Ning Zhang and
                  Ruoyu Wang and
                  Chaowei Xiao},
  title        = {Exploring the Limits of ChatGPT in Software Security Applications},
  journal      = {CoRR},
  volume       = {abs/2312.05275},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.05275},
  doi          = {10.48550/ARXIV.2312.05275},
  eprinttype    = {arXiv},
  eprint       = {2312.05275},
  timestamp    = {Wed, 03 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-05275.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-17726,
  author       = {Aishwarya Seth and
                  Saikath Bhattacharya and
                  Sarah Elder and
                  Nusrat Zahan and
                  Laurie A. Williams},
  title        = {Comparing Effectiveness and Efficiency of Interactive Application
                  Security Testing {(IAST)} and Runtime Application Self-Protection
                  {(RASP)} Tools in a Large Java-based System},
  journal      = {CoRR},
  volume       = {abs/2312.17726},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.17726},
  doi          = {10.48550/ARXIV.2312.17726},
  eprinttype    = {arXiv},
  eprint       = {2312.17726},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-17726.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhovratovichBM23,
  author       = {Dmitry Khovratovich and
                  Mario Marhuenda Beltr{\'{a}}n and
                  Bart Mennink},
  title        = {Generic Security of the {SAFE} {API} and Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/520},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhovratovichBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StefanAS23,
  author       = {Adrian{-}Daniel Stefan and
                  Ionut{-}Petrisor Anghel and
                  Emil Simion},
  title        = {Quantum-Safe Protocols and Application in Data Security of Medical
                  Records},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/041},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/StefanAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuCCYZ23,
  author       = {Shiyuan Xu and
                  Yibo Cao and
                  Xue Chen and
                  Siu{-}Ming Yiu and
                  Yanmin Zhao},
  title        = {Post-Quantum Public-key Authenticated Searchable Encryption with Forward
                  Security: General Construction, Implementation, and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {591},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/591},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuCCYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/ws/Song22,
  author       = {Hang Song},
  title        = {Internet of Everything - Key Technologies, Practical Applications
                  and Security of IoT},
  publisher    = {WorldScientific},
  year         = {2022},
  url          = {https://doi.org/10.1142/12526},
  doi          = {10.1142/12526},
  isbn         = {9789811246265},
  timestamp    = {Tue, 11 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/ws/Song22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Truong22,
  author       = {Thomas Truong},
  title        = {Object-Subject Relationship Detection using Deep Learning and Decision
                  Support Systems for Safety and Security Applications},
  school       = {University of Calgary, Alberta, Canada},
  year         = {2022},
  url          = {http://hdl.handle.net/1880/114338},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Truong22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Blochberger22,
  author       = {Maximilian Blochberger},
  title        = {Applied declarative security {\&} privacy mechanisms in macOS
                  applications = Angewandte deklarative Mechanismen zur Wahrung von
                  Anwendungssicherheit und Datenschutz in macOS-Anwendungen},
  school       = {University of Hamburg, Germany},
  year         = {2022},
  url          = {https://d-nb.info/1265819351},
  timestamp    = {Fri, 30 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Blochberger22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Hebborn22,
  author       = {Phil Hebborn},
  title        = {Security assessment and design of symmetric ciphers for emerging applications},
  school       = {Ruhr University Bochum, Germany},
  year         = {2022},
  url          = {https://hss-opus.ub.ruhr-uni-bochum.de/opus4/frontdoor/index/index/docId/8588},
  urn          = {urn:nbn:de:hbz:294-85883},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Hebborn22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Mohr22,
  author       = {Martin Mohr},
  title        = {Systematic Approaches to Advanced Information Flow Analysis - and
                  Applications to Software Security},
  school       = {Karlsruhe Institute of Technology, Germany},
  year         = {2022},
  url          = {https://nbn-resolving.org/urn:nbn:de:101:1-2022070604595001707702},
  urn          = {urn:nbn:de:101:1-2022070604595001707702},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/dnb/Mohr22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Abegg22,
  author       = {Jean{-}Philippe Abegg},
  title        = {Security and efficiency of blockchain technologies applied to internet-of-things
                  application. (S{\'{e}}curit{\'{e}} et {\'{e}}fficacit{\'{e}}
                  des technologies blockchain appliqu{\'{e}}es {\`{a}} l'internet
                  des objets)},
  school       = {University of Strasbourg, France},
  year         = {2022},
  url          = {https://tel.archives-ouvertes.fr/tel-04009659},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/hal/Abegg22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Auguste22,
  author       = {Amaury Auguste},
  title        = {D{\'{e}}ploiement d'un syst{\`{e}}me de suivi par vid{\'{e}}o
                  et analyse comportementale : application {\`{a}} la surveillance urbaine.
                  (Deployment of a video tracking and behavioral analysis system : application
                  to the security of urban spaces)},
  school       = {University of Western Brittany, Brest, France},
  year         = {2022},
  url          = {https://tel.archives-ouvertes.fr/tel-03922664},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/hal/Auguste22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Robles22,
  author       = {Virgile Robles},
  title        = {Specifying and verifying high-level requirements on large programs
                  : application to security of {C} programs. (Sp{\'{e}}cifier et
                  v{\'{e}}rifier des exigences de haut niveau sur des programmes
                  importants : application {\`{a}} la s{\'{e}}curit{\'{e}}
                  des programmes {C)}},
  school       = {University of Paris-Saclay, France},
  year         = {2022},
  url          = {https://tel.archives-ouvertes.fr/tel-03626084},
  timestamp    = {Fri, 27 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Robles22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/se/Horga22,
  author       = {Adrian Horga},
  title        = {Performance and Security Analysis for GPU-Based Applications},
  school       = {Link{\"{o}}ping University, Sweden},
  year         = {2022},
  url          = {https://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-189603},
  urn          = {urn:nbn:se:liu:diva-189603},
  doi          = {10.3384/9789179294885},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/se/Horga22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/tr/Sevri22,
  author       = {Mehmet Sevri},
  title        = {DER{\.{I}}N {\"{O}}{\u{G}}RENME Y{\"{O}}NTEMLER{\.{I}} {KULLANILARAK}
                  {WEB} {UYGULAMA} G{\"{U}}VENL{\.{I}}{\u{G}}{\.{I}} SA{\u{G}}LANMASI
                  {(ENSURING} {WEB} {APPLICATION} {SECURITY} {USING} {DEEP} {LEARNING}
                  {METHODS)}},
  school       = {Gazi University, Turkey},
  year         = {2022},
  url          = {https://tez.yok.gov.tr/UlusalTezMerkezi/tezDetay.jsp?id=W0tQyuxbr25kvI-OpF\_k1g\&no=4cTKIXxmUQPhlMAVpoHaVA},
  timestamp    = {Sun, 03 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/tr/Sevri22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/DeMarinis22,
  author       = {Nicholas DeMarinis},
  title        = {Improving Application Security at Scale by Reducing System Call and
                  Library Overprivilege},
  school       = {Brown University, {USA}},
  year         = {2022},
  url          = {https://cs.brown.edu/research/pubs/theses/phd/2022/demarinis.nicholas.pdf},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/DeMarinis22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AbbasiPPC22,
  author       = {Mahmoud Abbasi and
                  Marta Plaza{-}Hern{\'{a}}ndez and
                  Javier Prieto and
                  Juan M. Corchado},
  title        = {Security in the Internet of Things Application Layer: Requirements,
                  Threats, and Solutions},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {97197--97216},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3205351},
  doi          = {10.1109/ACCESS.2022.3205351},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AbbasiPPC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AbdulghaniNK22,
  author       = {Hezam Akram Abdulghani and
                  Niels Alexander Nijdam and
                  Dimitri Konstantas},
  title        = {Analysis on Security and Privacy Guidelines: RFID-Based IoT Applications},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {131528--131554},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3227449},
  doi          = {10.1109/ACCESS.2022.3227449},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AbdulghaniNK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/CharfeddineMSAA22,
  author       = {Maha Charfeddine and
                  Eya Mezghani and
                  Masmoudi Salma and
                  Chokri Ben Amar and
                  Hesham Alhumyani},
  title        = {Audio Watermarking for Security and Non-Security Applications},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {12654--12677},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3145950},
  doi          = {10.1109/ACCESS.2022.3145950},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/CharfeddineMSAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DiniBCPFSS22,
  author       = {Pierpaolo Dini and
                  Andrea Begni and
                  Stefano Ciavarella and
                  Emiliano De Paoli and
                  Giuseppe Fiorelli and
                  Carmelo Silvestro and
                  Sergio Saponara},
  title        = {Design and Testing Novel One-Class Classifier Based on Polynomial
                  Interpolation With Application to Networking Security},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {67910--67924},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3186026},
  doi          = {10.1109/ACCESS.2022.3186026},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DiniBCPFSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DivyanshuKKAM22,
  author       = {Divyanshu Divyanshu and
                  Rajat Kumar and
                  Danial Khan and
                  Selma Amara and
                  Yehia Massoud},
  title        = {Physically Unclonable Function Using {GSHE} Driven {SOT} Assisted
                  p-MTJ for Next Generation Hardware Security Applications},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {93029--93038},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3203817},
  doi          = {10.1109/ACCESS.2022.3203817},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DivyanshuKKAM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/FerragFHMJ22,
  author       = {Mohamed Amine Ferrag and
                  Othmane Friha and
                  Djallel Hamouda and
                  Leandros A. Maglaras and
                  Helge Janicke},
  title        = {Edge-IIoTset: {A} New Comprehensive Realistic Cyber Security Dataset
                  of IoT and IIoT Applications for Centralized and Federated Learning},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {40281--40306},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3165809},
  doi          = {10.1109/ACCESS.2022.3165809},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/FerragFHMJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HalakYS22,
  author       = {Basel Halak and
                  Yildiran Yilmaz and
                  Daniel Shiu},
  title        = {Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based
                  Security Applications},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {76707--76719},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3192970},
  doi          = {10.1109/ACCESS.2022.3192970},
  timestamp    = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HalakYS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HalakYS22a,
  author       = {Basel Halak and
                  Yildiran Yilmaz and
                  Daniel Shiu},
  title        = {Comments and Corrections Correction to "Comparative Analysis of Energy
                  Costs of Asymmetric vs Symmetric Encryption-Based Security Applications"},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {118522},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3219282},
  doi          = {10.1109/ACCESS.2022.3219282},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HalakYS22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SunLCLIZIA22,
  author       = {Nan Sun and
                  Chang{-}Tsun Li and
                  Hin Chan and
                  Ba Dung Le and
                  Md Zahidul Islam and
                  Leo Yu Zhang and
                  Md. Rafiqul Islam and
                  Warren Armstrong},
  title        = {Defining Security Requirements With the Common Criteria: Applications,
                  Adoptions, and Challenges},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {44756--44777},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3168716},
  doi          = {10.1109/ACCESS.2022.3168716},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/SunLCLIZIA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WazidDMP22,
  author       = {Mohammad Wazid and
                  Ashok Kumar Das and
                  Noor Mohd and
                  Youngho Park},
  title        = {Healthcare 5.0 Security Framework: Applications, Issues and Future
                  Research Directions},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {129429--129442},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3228505},
  doi          = {10.1109/ACCESS.2022.3228505},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WazidDMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangHDYT22,
  author       = {Zhibo Zhang and
                  Hussam M. N. Al Hamadi and
                  Ernesto Damiani and
                  Chan Yeob Yeun and
                  Fatma Taher},
  title        = {Explainable Artificial Intelligence Applications in Cyber Security:
                  State-of-the-Art in Research},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {93104--93139},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3204051},
  doi          = {10.1109/ACCESS.2022.3204051},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangHDYT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cal/BarberGZT22,
  author       = {Kristin Barber and
                  Moein Ghaniyoun and
                  Yinqian Zhang and
                  Radu Teodorescu},
  title        = {A Pre-Silicon Approach to Discovering Microarchitectural Vulnerabilities
                  in Security Critical Applications},
  journal      = {{IEEE} Comput. Archit. Lett.},
  volume       = {21},
  number       = {1},
  pages        = {9--12},
  year         = {2022},
  url          = {https://doi.org/10.1109/LCA.2022.3151256},
  doi          = {10.1109/LCA.2022.3151256},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cal/BarberGZT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/WangMR22,
  author       = {Liang Wang and
                  Prateek Mittal and
                  Jennifer Rexford},
  title        = {Data-plane security applications in adversarial settings},
  journal      = {Comput. Commun. Rev.},
  volume       = {52},
  number       = {2},
  pages        = {2--9},
  year         = {2022},
  url          = {https://doi.org/10.1145/3544912.3544914},
  doi          = {10.1145/3544912.3544914},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/WangMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/CollottaYZS22,
  author       = {Mario Collotta and
                  Ilsun You and
                  Sherali Zeadally and
                  Fei Song},
  title        = {Introduction to the special section on Smart Green Applications: QoS
                  and Security-aware solutions in collaborative wireless networks (VSI-cwn)},
  journal      = {Comput. Electr. Eng.},
  volume       = {97},
  pages        = {107656},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.compeleceng.2021.107656},
  doi          = {10.1016/J.COMPELECENG.2021.107656},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/CollottaYZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cleiej/BetarteCDGMMM22,
  author       = {Gustavo Betarte and
                  Juan Diego Campo and
                  Andrea Delgado and
                  Laura Gonz{\'{a}}lez and
                  {\'{A}}lvaro Mart{\'{\i}}n and
                  Rodrigo Mart{\'{\i}}nez and
                  B{\'{a}}rbara Muracciole},
  title        = {Contact tracing solutions for {COVID-19:} applications, data privacy
                  and security},
  journal      = {{CLEI} Electron. J.},
  volume       = {25},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.19153/cleiej.25.2.4},
  doi          = {10.19153/CLEIEJ.25.2.4},
  timestamp    = {Fri, 30 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cleiej/BetarteCDGMMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AlSabehKKCB22,
  author       = {Ali AlSabeh and
                  Joseph Khoury and
                  Elie F. Kfoury and
                  Jorge Crichigno and
                  Elias Bou{-}Harb},
  title        = {A survey on security applications of {P4} programmable switches and
                  a STRIDE-based vulnerability assessment},
  journal      = {Comput. Networks},
  volume       = {207},
  pages        = {108800},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.108800},
  doi          = {10.1016/J.COMNET.2022.108800},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/AlSabehKKCB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LuoYXJWS22,
  author       = {Meng Luo and
                  Yepeng Yao and
                  Liling Xin and
                  Zhengwei Jiang and
                  Qiuyun Wang and
                  Wenchang Shi},
  title        = {Measurement for encrypted open resolvers: Applications and security},
  journal      = {Comput. Networks},
  volume       = {213},
  pages        = {109081},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.109081},
  doi          = {10.1016/J.COMNET.2022.109081},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/LuoYXJWS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SinghWDCG22,
  author       = {Jaskaran Singh and
                  Mohammad Wazid and
                  Ashok Kumar Das and
                  Vinay Chamola and
                  Mohsen Guizani},
  title        = {Machine learning security attacks and defense approaches for emerging
                  cyber physical applications: {A} comprehensive survey},
  journal      = {Comput. Commun.},
  volume       = {192},
  pages        = {316--331},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comcom.2022.06.012},
  doi          = {10.1016/J.COMCOM.2022.06.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/SinghWDCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChahalBK22,
  author       = {Navdeep S. Chahal and
                  Preeti Bali and
                  Praveen Kumar Khosla},
  title        = {A Proactive Approach to assess web application security through the
                  integration of security tools in a Security Orchestration Platform},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102886},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102886},
  doi          = {10.1016/J.COSE.2022.102886},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChahalBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/KrishnamoorthyK22,
  author       = {Ramesh Krishnamoorthy and
                  Kalimuthu Krishnan},
  title        = {An optimum security enabled System-on-Chip selection for Internet
                  of Things applications using genetic algorithm modeling},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {34},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/cpe.6635},
  doi          = {10.1002/CPE.6635},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/KrishnamoorthyK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/XuHM22,
  author       = {Bing Xu and
                  Darong Huang and
                  Bo Mi},
  title        = {Research on the application of mobile payment security system based
                  on the Internet of Things},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {34},
  number       = {9},
  year         = {2022},
  url          = {https://doi.org/10.1002/cpe.5779},
  doi          = {10.1002/CPE.5779},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/XuHM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ChenLXCFT21,
  author       = {Fei Chen and
                  Duming Luo and
                  Tao Xiang and
                  Ping Chen and
                  Junfeng Fan and
                  Hong Linh Truong},
  title        = {IoT Cloud Security Review: {A} Case Study Approach Using Emerging
                  Consumer-oriented Applications},
  journal      = {{ACM} Comput. Surv.},
  volume       = {54},
  number       = {4},
  pages        = {75:1--75:36},
  year         = {2022},
  url          = {https://doi.org/10.1145/3447625},
  doi          = {10.1145/3447625},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/ChenLXCFT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/JhaN22,
  author       = {Ashwin Jha and
                  Mridul Nandi},
  title        = {A Survey on Applications of H-Technique: Revisiting Security Analysis
                  of {PRP} and {PRF}},
  journal      = {Entropy},
  volume       = {24},
  number       = {4},
  pages        = {462},
  year         = {2022},
  url          = {https://doi.org/10.3390/e24040462},
  doi          = {10.3390/E24040462},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/JhaN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/es/HaqueBD22,
  author       = {A. K. M. Bahalul Haque and
                  Bharat Bhushan and
                  Gaurav Dhiman},
  title        = {Conceptualizing smart city applications: Requirements, architecture,
                  security issues, and emerging trends},
  journal      = {Expert Syst. J. Knowl. Eng.},
  volume       = {39},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1111/exsy.12753},
  doi          = {10.1111/EXSY.12753},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/es/HaqueBD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/AlidoostiNN22,
  author       = {Mitra Alidoosti and
                  Alireza Nowroozi and
                  Ahmad Nickabadi},
  title        = {Semantic web Racer: Dynamic security testing of the web application
                  against race condition in the business layer},
  journal      = {Expert Syst. Appl.},
  volume       = {195},
  pages        = {116569},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.eswa.2022.116569},
  doi          = {10.1016/J.ESWA.2022.116569},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/AlidoostiNN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/et/RSAP22,
  author       = {Naveenkumar R and
                  N. M. Sivamangai and
                  Napolean A and
                  S. Sridevi Sathya Priya},
  title        = {Design and Evaluation of {XOR} Arbiter Physical Unclonable Function
                  and its Implementation on {FPGA} in Hardware Security Applications},
  journal      = {J. Electron. Test.},
  volume       = {38},
  number       = {6},
  pages        = {653--666},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10836-022-06034-7},
  doi          = {10.1007/S10836-022-06034-7},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/et/RSAP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/ChenZDH22,
  author       = {Ze Chen and
                  Xiaojun Zuo and
                  Na Dong and
                  Botao Hou},
  title        = {Application of network security penetration technology in power internet
                  of things security vulnerability detection},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {33},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/ett.3859},
  doi          = {10.1002/ETT.3859},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/ChenZDH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/KongZGHL22,
  author       = {Ke Kong and
                  Zhaoxin Zhang and
                  Changyong Guo and
                  Jideng Han and
                  Gang Long},
  title        = {{PMMSA:} Security analysis system for android wearable applications
                  based on permission matching and malware similarity analysis},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {137},
  pages        = {349--362},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2022.08.002},
  doi          = {10.1016/J.FUTURE.2022.08.002},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/KongZGHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiuWHW22,
  author       = {Qin Liu and
                  Guojun Wang and
                  Jiankun Hu and
                  Jie Wu},
  title        = {Preface of special issue on Artificial Intelligence: The security
                  {\&} privacy opportunities and challenges for emerging applications},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {133},
  pages        = {169--170},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2022.03.021},
  doi          = {10.1016/J.FUTURE.2022.03.021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiuWHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/AngSN22,
  author       = {Kenneth Li{-}Minn Ang and
                  Jasmine Kah{-}Phooi Seng and
                  Ericmoore Ngharamike},
  title        = {Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures,
                  Security and Applications},
  journal      = {Future Internet},
  volume       = {14},
  number       = {2},
  pages        = {49},
  year         = {2022},
  url          = {https://doi.org/10.3390/fi14020049},
  doi          = {10.3390/FI14020049},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/AngSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ShostackMBS22,
  author       = {Adam Shostack and
                  Fabio Massacci and
                  Eric Bodden and
                  Antonino Sabetta},
  title        = {25 Years in Application Security: Looking Back, Looking Forward},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {1},
  pages        = {109--112},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2021.3127961},
  doi          = {10.1109/MSEC.2021.3127961},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ShostackMBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cps/SinghGPSB22,
  author       = {Vivek Kumar Singh and
                  Manimaran Govindarasu and
                  Donald Porschet and
                  Edward Shaffer and
                  Morris Berman},
  title        = {NEFTSec: Networked federation testbed for cyber-physical security
                  of smart grid: Architecture, applications, and evaluation},
  journal      = {{IET} Cyper-Phys. Syst.: Theory {\&} Appl.},
  volume       = {7},
  number       = {4},
  pages        = {197--211},
  year         = {2022},
  url          = {https://doi.org/10.1049/cps2.12033},
  doi          = {10.1049/CPS2.12033},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-cps/SinghGPSB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ShenLWSH22,
  author       = {Xuan Shen and
                  Guoqiang Liu and
                  Xiaofeng Wang and
                  Bing Sun and
                  Jun He},
  title        = {Security evaluation on type-1 and type-1-like 4-branch generalized
                  Feistel structures and application to reduced-round Lesamnta-LW-BC},
  journal      = {{IET} Inf. Secur.},
  volume       = {16},
  number       = {5},
  pages        = {390--400},
  year         = {2022},
  url          = {https://doi.org/10.1049/ise2.12065},
  doi          = {10.1049/ISE2.12065},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ShenLWSH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbpim/RebiaiMB22,
  author       = {Samiha Rebiai and
                  El Kamel Merah and
                  Djallel Eddine Boubiche},
  title        = {A novel comprehensive extension to {BPMN} language for security-aware
                  two-tier security model and architecture of cloud applications},
  journal      = {Int. J. Bus. Process. Integr. Manag.},
  volume       = {11},
  number       = {2},
  pages        = {135--148},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJBPIM.2022.10053836},
  doi          = {10.1504/IJBPIM.2022.10053836},
  timestamp    = {Wed, 22 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijbpim/RebiaiMB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnds/DasMJ22,
  author       = {Sunayana Das and
                  Bhabendu Kumar Mohanta and
                  Debasish Jena},
  title        = {A state-of-the-art security and attacks analysis in blockchain applications
                  network},
  journal      = {Int. J. Commun. Networks Distributed Syst.},
  volume       = {28},
  number       = {2},
  pages        = {199--218},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJCNDS.2022.121199},
  doi          = {10.1504/IJCNDS.2022.121199},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnds/DasMJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/Du22,
  author       = {Meiyan Du},
  title        = {Application of information communication network security management
                  and control based on big data technology},
  journal      = {Int. J. Commun. Syst.},
  volume       = {35},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/dac.4643},
  doi          = {10.1002/DAC.4643},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/Du22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/NandanR22,
  author       = {V. Nandan and
                  R. Gowri Shankar Rao},
  title        = {Low-power and area-efficient design of {AES} S-Box using enhanced
                  transformation method for security application},
  journal      = {Int. J. Commun. Syst.},
  volume       = {35},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/dac.4308},
  doi          = {10.1002/DAC.4308},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/NandanR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfs/SuZWC22,
  author       = {Yong Su and
                  Mengwei Zhao and
                  Cun Wei and
                  Xudong Chen},
  title        = {{PT-TODIM} Method for Probabilistic Linguistic {MAGDM} and Application
                  to Industrial Control System Security Supplier Selection},
  journal      = {Int. J. Fuzzy Syst.},
  volume       = {24},
  number       = {1},
  pages        = {202--215},
  year         = {2022},
  url          = {https://doi.org/10.1007/s40815-021-01125-7},
  doi          = {10.1007/S40815-021-01125-7},
  timestamp    = {Thu, 24 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijfs/SuZWC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijict/Liu22a,
  author       = {Qiuxia Liu},
  title        = {Research on the application of data fusion technology in the security
                  of wireless sensor networks},
  journal      = {Int. J. Inf. Commun. Technol.},
  volume       = {21},
  number       = {1},
  pages        = {37--48},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJICT.2022.124323},
  doi          = {10.1504/IJICT.2022.124323},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijict/Liu22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfomandi/AmponsahAW22,
  author       = {Anokye Acheampong Amponsah and
                  Adebayo Felix Adekoya and
                  Benjamin Asubam Weyori},
  title        = {Improving the Financial Security of National Health Insurance using
                  Cloud-Based Blockchain Technology Application},
  journal      = {Int. J. Inf. Manag. Data Insights},
  volume       = {2},
  number       = {1},
  pages        = {100081},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jjimei.2022.100081},
  doi          = {10.1016/J.JJIMEI.2022.100081},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijinfomandi/AmponsahAW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/DuanGAKA22,
  author       = {Wen{-}Qi Duan and
                  Muhammad Gulistan and
                  Fizza Hussain Abbasi and
                  Adnan Khurshid and
                  Mohammed M. Ali Al{-}Shamiri},
  title        = {q-Rung double hierarchy linguistic term set fuzzy AHP; applications
                  in the security system threats features of social media platforms},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {8},
  pages        = {5152--5185},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.22755},
  doi          = {10.1002/INT.22755},
  timestamp    = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/DuanGAKA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/Stewart22,
  author       = {Harrison Stewart},
  title        = {Security versus Compliance: An Empirical Study of the Impact of Industry
                  Standards Compliance on Application Security},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {32},
  number       = {3},
  pages        = {363--393},
  year         = {2022},
  url          = {https://doi.org/10.1142/S0218194022500152},
  doi          = {10.1142/S0218194022500152},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/Stewart22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/MatuleviciusIEG22,
  author       = {Raimundas Matulevicius and
                  Mubashar Iqbal and
                  Emna Ammar Elhadjamor and
                  Sonia Ayachi Ghannouchi and
                  Mariia Bakhtina and
                  Slaheddine Ghannouchi},
  title        = {Ontological Representation of Healthcare Application Security Using
                  Blockchain Technology},
  journal      = {Informatica},
  volume       = {33},
  number       = {2},
  pages        = {365--397},
  year         = {2022},
  url          = {https://doi.org/10.15388/22-INFOR486},
  doi          = {10.15388/22-INFOR486},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/informaticaLT/MatuleviciusIEG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/JimenezD22,
  author       = {Francisco Jos{\'{e}} Fern{\'{a}}ndez Jim{\'{e}}nez and
                  Jos{\'{e}} Ramiro Martinez de Dios},
  title        = {A Robot-Sensor Network Security Architecture for Monitoring Applications},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {8},
  pages        = {6288--6304},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3113756},
  doi          = {10.1109/JIOT.2021.3113756},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/JimenezD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/KhadkaRKC22,
  author       = {Grishma Khadka and
                  Biplob Ray and
                  Nemai Chandra Karmakar and
                  Jinho Choi},
  title        = {Physical-Layer Detection and Security of Printed Chipless {RFID} Tag
                  for Internet of Things Applications},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {17},
  pages        = {15714--15724},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3151364},
  doi          = {10.1109/JIOT.2022.3151364},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/KhadkaRKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AndarzianL22,
  author       = {Seyed Behnam Andarzian and
                  Behrouz Tork Ladani},
  title        = {{SANT:} Static Analysis of Native Threads for Security Vetting of
                  Android Applications},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {13--25},
  year         = {2022},
  url          = {https://doi.org/10.22042/isecure.2021.247906.572},
  doi          = {10.22042/ISECURE.2021.247906.572},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/AndarzianL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/0002P22,
  author       = {Peter Sabev and
                  Milen Petrov},
  title        = {Android Password Managers and Vault Applications: Data Storage Security
                  Issues Identification},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103152},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103152},
  doi          = {10.1016/J.JISA.2022.103152},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/0002P22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AhalawatBTP22a,
  author       = {Anchal Ahalawat and
                  Korra Sathya Babu and
                  Ashok Kumar Turuk and
                  Sanjeev Patel},
  title        = {Corrigendum to "A low-rate DDoS detection and mitigation for {SDN}
                  using Renyi Entropy with Packet Drop" [Journal of Information Security
                  and Applications 68 {(2022)} 103212]},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103344},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103344},
  doi          = {10.1016/J.JISA.2022.103344},
  timestamp    = {Mon, 14 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AhalawatBTP22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Bagherpour22a,
  author       = {Bagher Bagherpour},
  title        = {Corrigendum to "An efficient verifiable secret redistribution scheme"
                  [Journal of information security and applications, 69 {(2022)103295]}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103356},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103356},
  doi          = {10.1016/J.JISA.2022.103356},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Bagherpour22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenXMZWLSX22,
  author       = {Li{-}Bo Chen and
                  Yihang Xia and
                  Zhenbang Ma and
                  Ruijie Zhao and
                  Yanhao Wang and
                  Yue Liu and
                  Wenqi Sun and
                  Zhi Xue},
  title        = {{SEAF:} {A} Scalable, Efficient, and Application-independent Framework
                  for container security detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {71},
  pages        = {103351},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103351},
  doi          = {10.1016/J.JISA.2022.103351},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChenXMZWLSX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DeverashettiKP22,
  author       = {Mounika Deverashetti and
                  Ranjitha K. and
                  K. V. Pradeepthi},
  title        = {Security analysis of menstruation cycle tracking applications using
                  static, dynamic and machine learning techniques},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {67},
  pages        = {103171},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103171},
  doi          = {10.1016/J.JISA.2022.103171},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DeverashettiKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FarzadniaSN22,
  author       = {Ehsan Farzadnia and
                  Hossein Shirazi and
                  Alireza Nowroozi},
  title        = {Corrigendum to 'A novel sophisticated hybrid method for intrusion
                  detection using the artificial immune system': Journal of Information
                  Security and Applications Volume 58, May 2021, 102721},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {70},
  pages        = {103349},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103349},
  doi          = {10.1016/J.JISA.2022.103349},
  timestamp    = {Mon, 14 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/FarzadniaSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/SevriK22,
  author       = {Mehmet Sevri and
                  Hacer Karacan},
  title        = {Two Stage Deep Learning Based Stacked Ensemble Model for Web Application
                  Security},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {632--657},
  year         = {2022},
  url          = {https://doi.org/10.3837/tiis.2022.02.014},
  doi          = {10.3837/TIIS.2022.02.014},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/SevriK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcmse/Wang22e,
  author       = {Lei Wang},
  title        = {Speech denoising algorithm and artificial intelligence application
                  in network security},
  journal      = {J. Comput. Methods Sci. Eng.},
  volume       = {22},
  number       = {6},
  pages        = {2243--2255},
  year         = {2022},
  url          = {https://doi.org/10.3233/JCM-226368},
  doi          = {10.3233/JCM-226368},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcmse/Wang22e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/AmineFRS22,
  author       = {Khaldi Amine and
                  Kahlessenane Fares and
                  Kafi Med Redouane and
                  Euschi Salah},
  title        = {Medical Image Watermarking for Telemedicine Application Security},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {31},
  number       = {5},
  pages        = {2250097:1--2250097:17},
  year         = {2022},
  url          = {https://doi.org/10.1142/S0218126622500979},
  doi          = {10.1142/S0218126622500979},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/AmineFRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/HuangXLLY22,
  author       = {Haining Huang and
                  Lihua Xu and
                  Haomin Lu and
                  Zhencheng Lin and
                  Wei Yan},
  title        = {Application Optimization of Cloud Management Mode in Information Technology
                  in Sudden Social Security Incidents},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {31},
  number       = {12},
  pages        = {2250212:1--2250212:20},
  year         = {2022},
  url          = {https://doi.org/10.1142/S0218126622502127},
  doi          = {10.1142/S0218126622502127},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/HuangXLLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/AydosACS22,
  author       = {Murat Aydos and
                  {\c{C}}igdem Aldan and
                  Evren Coskun and
                  Alperen Soydan},
  title        = {Security testing of web applications: {A} systematic mapping of the
                  literature},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {34},
  number       = {9},
  pages        = {6775--6792},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jksuci.2021.09.018},
  doi          = {10.1016/J.JKSUCI.2021.09.018},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/AydosACS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlap/NigamT22,
  author       = {Vivek Nigam and
                  Carolyn L. Talcott},
  title        = {Automated construction of security integrity wrappers for Industry
                  4.0 applications},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {126},
  pages        = {100745},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jlamp.2021.100745},
  doi          = {10.1016/J.JLAMP.2021.100745},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jlap/NigamT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/Adu-ManuESBD22,
  author       = {Kofi Sarpong Adu{-}Manu and
                  Felicia Engmann and
                  Godwin Sarfo{-}Kantanka and
                  Godwill Enchill Baiden and
                  Bernice Akusika Dulemordzi},
  title        = {{WSN} Protocols and Security Challenges for Environmental Monitoring
                  Applications: {A} Survey},
  journal      = {J. Sensors},
  volume       = {2022},
  pages        = {1--21},
  year         = {2022},
  url          = {https://doi.org/10.1155/2022/1628537},
  doi          = {10.1155/2022/1628537},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/js/Adu-ManuESBD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jwe/LachkovTB22,
  author       = {Petar Lachkov and
                  Lo'ai Tawalbeh and
                  Smriti Bhatt},
  title        = {Vulnerability Assessment for Applications Security Through Penetration
                  Simulation and Testing},
  journal      = {J. Web Eng.},
  volume       = {21},
  number       = {7},
  pages        = {2187--2208},
  year         = {2022},
  url          = {https://doi.org/10.13052/jwe1540-9589.2178},
  doi          = {10.13052/JWE1540-9589.2178},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jwe/LachkovTB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jwe/ZhangZ22,
  author       = {Yanling Zhang and
                  Ting Zhang},
  title        = {Research Into the Security Threat of Web Application},
  journal      = {J. Web Eng.},
  volume       = {21},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.13052/jwe1540-9589.21514},
  doi          = {10.13052/JWE1540-9589.21514},
  timestamp    = {Sat, 17 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jwe/ZhangZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mdpinetwork/RosendoG22,
  author       = {Miguel Rosendo and
                  Jorge Granjal},
  title        = {Energy-Aware Security Adaptation for Low-Power IoT Applications},
  journal      = {Network},
  volume       = {2},
  number       = {1},
  pages        = {36--52},
  year         = {2022},
  url          = {https://doi.org/10.3390/network2010003},
  doi          = {10.3390/NETWORK2010003},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mdpinetwork/RosendoG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mj/MorsaliMR22,
  author       = {Mehrdad Morsali and
                  Mohammad Hossein Moaiyeri and
                  Ramin Rajaei},
  title        = {A process variation resilient spintronic true random number generator
                  for highly reliable hardware security applications},
  journal      = {Microelectron. J.},
  volume       = {129},
  pages        = {105606},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.mejo.2022.105606},
  doi          = {10.1016/J.MEJO.2022.105606},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mj/MorsaliMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/Wu22,
  author       = {Xuejun Wu},
  title        = {Special Issue on Advanced Network Security: Methods and Applications},
  journal      = {Mob. Networks Appl.},
  volume       = {27},
  number       = {4},
  pages        = {1337--1338},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11036-022-01983-x},
  doi          = {10.1007/S11036-022-01983-X},
  timestamp    = {Thu, 06 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/Wu22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/HaiderSASK22,
  author       = {Muhammad Imran Haider and
                  Tariq Shah and
                  Asif Ali and
                  Dawood Shah and
                  Ijaz Khalid},
  title        = {Pseudo random sequences based on elliptic curve subgroups and mathematical
                  model for its application to digital image security},
  journal      = {Multim. Tools Appl.},
  volume       = {81},
  number       = {17},
  pages        = {23709--23734},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11042-022-12358-5},
  doi          = {10.1007/S11042-022-12358-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/HaiderSASK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/SrivastavaJRPJ22,
  author       = {Akhilesh M. Srivastava and
                  Arushi Jain and
                  Priyanka Rotte and
                  Surya Prakash and
                  Umarani Jayaraman},
  title        = {A technique to match highly similar 3D objects with an application
                  to biomedical security},
  journal      = {Multim. Tools Appl.},
  volume       = {81},
  number       = {10},
  pages        = {13159--13178},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11042-020-10161-8},
  doi          = {10.1007/S11042-020-10161-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/SrivastavaJRPJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmhci/TurnerPNL22,
  author       = {Sarah Turner and
                  Nandita Pattnaik and
                  Jason R. C. Nurse and
                  Shujun Li},
  title        = {"You Just Assume It Is In There, {I} Guess": Understanding {UK} Families'
                  Application and Knowledge of Smart Home Cyber Security},
  journal      = {Proc. {ACM} Hum. Comput. Interact.},
  volume       = {6},
  number       = {{CSCW2}},
  pages        = {1--34},
  year         = {2022},
  url          = {https://doi.org/10.1145/3555159},
  doi          = {10.1145/3555159},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmhci/TurnerPNL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GruberHGUG22,
  author       = {Moritz Gruber and
                  Christian H{\"{o}}fig and
                  Maximilian Golla and
                  Tobias Urban and
                  Matteo Gro{\ss}e{-}Kampmann},
  title        = {"We may share the number of diaper changes": {A} Privacy and Security
                  Analysis of Mobile Child Care Applications},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {3},
  pages        = {394--414},
  year         = {2022},
  url          = {https://doi.org/10.56553/popets-2022-0078},
  doi          = {10.56553/POPETS-2022-0078},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/GruberHGUG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/programming/PupoNB22,
  author       = {Angel Luis Scull Pupo and
                  Jens Nicolay and
                  Elisa Gonzalez Boix},
  title        = {Deriving Static Security Testing from Runtime Security Protection
                  for Web Applications},
  journal      = {Art Sci. Eng. Program.},
  volume       = {6},
  number       = {1},
  pages        = {1},
  year         = {2022},
  url          = {https://doi.org/10.22152/programming-journal.org/2022/6/1},
  doi          = {10.22152/PROGRAMMING-JOURNAL.ORG/2022/6/1},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/programming/PupoNB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/JalaliNEAF22,
  author       = {Foad Jalali and
                  Mehran Alidoost Nia and
                  Tatiana Ermakova and
                  Meisam Abdollahi and
                  Benjamin Fabian},
  title        = {Investigating the role of usable security in developers' intention
                  toward security enhancement in service-oriented applications},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.199},
  doi          = {10.1002/SPY2.199},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/JalaliNEAF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/Abdel-BassetGSE22,
  author       = {Mohamed Abdel{-}Basset and
                  Abduallah Gamal and
                  Karam M. Sallam and
                  Ibrahim Elgendi and
                  Kumudu S. Munasinghe and
                  Abbas Jamalipour},
  title        = {An Optimization Model for Appraising Intrusion-Detection Systems for
                  Network Security Communications: Applications, Challenges, and Solutions},
  journal      = {Sensors},
  volume       = {22},
  number       = {11},
  pages        = {4123},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22114123},
  doi          = {10.3390/S22114123},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/Abdel-BassetGSE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ChorasKP22,
  author       = {Michal Choras and
                  Rafal Kozik and
                  Marek Pawlicki},
  title        = {Sensors and Pattern Recognition Methods for Security and Industrial
                  Applications},
  journal      = {Sensors},
  volume       = {22},
  number       = {16},
  pages        = {5968},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22165968},
  doi          = {10.3390/S22165968},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/ChorasKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/GavricB22,
  author       = {Nikola Gavric and
                  Zivko Bojovic},
  title        = {Security Concerns in {MMO} Games - Analysis of a Potent Application
                  Layer DDoS Threat},
  journal      = {Sensors},
  volume       = {22},
  number       = {20},
  pages        = {7791},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22207791},
  doi          = {10.3390/S22207791},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/GavricB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HakeemHK22,
  author       = {Shimaa A. Abdel Hakeem and
                  Hanan H. Hussein and
                  HyungWon Kim},
  title        = {Security Requirements and Challenges of 6G Technologies and Applications},
  journal      = {Sensors},
  volume       = {22},
  number       = {5},
  pages        = {1969},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22051969},
  doi          = {10.3390/S22051969},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/HakeemHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/OgbodoAK22,
  author       = {Emmanuel Utochukwu Ogbodo and
                  Adnan M. Abu{-}Mahfouz and
                  Anish Mathew Kurien},
  title        = {A Survey on 5G and LPWAN-IoT for Improved Smart Cities and Remote
                  Area Applications: From the Aspect of Architecture and Security},
  journal      = {Sensors},
  volume       = {22},
  number       = {16},
  pages        = {6313},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22166313},
  doi          = {10.3390/S22166313},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/OgbodoAK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sis/AnsariAK22,
  author       = {Md Tarique Jamal Ansari and
                  Alka Agrawal and
                  Raees Ahmad Khan},
  title        = {DURASec: Durable Security Blueprints for Web-Applications Empowering
                  Digital India Initiative},
  journal      = {{EAI} Endorsed Trans. Scalable Inf. Syst.},
  volume       = {9},
  number       = {4},
  pages        = {7},
  year         = {2022},
  url          = {https://doi.org/10.4108/eai.13-1-2022.172816},
  doi          = {10.4108/EAI.13-1-2022.172816},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sis/AnsariAK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/Qiang22,
  author       = {Xu Jian Qiang},
  title        = {Computer application under the management of network information security
                  technology using genetic algorithm},
  journal      = {Soft Comput.},
  volume       = {26},
  number       = {16},
  pages        = {7871--7876},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00500-022-06813-6},
  doi          = {10.1007/S00500-022-06813-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/Qiang22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/stvr/AlalfiPN22,
  author       = {Manar H. Alalfi and
                  Sajeda Parveen and
                  Bara' Nazzal},
  title        = {A mutation framework for evaluating security analysis tools in IoT
                  applications},
  journal      = {Softw. Test. Verification Reliab.},
  volume       = {32},
  number       = {7},
  year         = {2022},
  url          = {https://doi.org/10.1002/stvr.1799},
  doi          = {10.1002/STVR.1799},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/stvr/AlalfiPN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/DengWZWL22,
  author       = {Chao Deng and
                  Changyun Wen and
                  Ying Zou and
                  Wei Wang and
                  Xinyao Li},
  title        = {A Hierarchical Security Control Framework of Nonlinear CPSs Against
                  DoS Attacks With Application to Power Sharing of {AC} Microgrids},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {52},
  number       = {6},
  pages        = {5255--5266},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCYB.2020.3029045},
  doi          = {10.1109/TCYB.2020.3029045},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/DengWZWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/ZhangP22,
  author       = {Weihai Zhang and
                  Chenchen Peng},
  title        = {Indefinite Mean-Field Stochastic Cooperative Linear-Quadratic Dynamic
                  Difference Game With Its Application to the Network Security Model},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {52},
  number       = {11},
  pages        = {11805--11818},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCYB.2021.3070352},
  doi          = {10.1109/TCYB.2021.3070352},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcyb/ZhangP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tem/RodgersAA22,
  author       = {Waymond Rodgers and
                  Rexford Attah{-}Boakye and
                  Kweku Adams},
  title        = {Application of Algorithmic Cognitive Decision Trust Modeling for Cyber
                  Security Within Organisations},
  journal      = {{IEEE} Trans. Engineering Management},
  volume       = {69},
  number       = {6},
  pages        = {3792--3801},
  year         = {2022},
  url          = {https://doi.org/10.1109/TEM.2020.3019218},
  doi          = {10.1109/TEM.2020.3019218},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tem/RodgersAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/AlazabGS22,
  author       = {Mamoun Alazab and
                  Thippa Reddy Gadekallu and
                  Chunhua Su},
  title        = {Guest Editorial: Security and Privacy Issues in Industry 4.0 Applications},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {18},
  number       = {9},
  pages        = {6326--6329},
  year         = {2022},
  url          = {https://doi.org/10.1109/TII.2022.3164741},
  doi          = {10.1109/TII.2022.3164741},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/AlazabGS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ShojafarMPA22,
  author       = {Mohammad Shojafar and
                  Mithun Mukherjee and
                  Vincenzo Piuri and
                  Jemal H. Abawajy},
  title        = {Guest Editorial: Security and Privacy of Federated Learning Solutions
                  for Industrial IoT Applications},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {18},
  number       = {5},
  pages        = {3519--3521},
  year         = {2022},
  url          = {https://doi.org/10.1109/TII.2021.3128972},
  doi          = {10.1109/TII.2021.3128972},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/ShojafarMPA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/XiaoWCMA22,
  author       = {Bin Xiao and
                  Fan Wu and
                  Francesco Chiti and
                  Mohammad Hossein Manshaei and
                  Giuseppe Ateniese},
  title        = {Guest Editorial: Introduction to the Special Section on Security and
                  Privacy for {AI} Models and Applications},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {171--172},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSE.2021.3133123},
  doi          = {10.1109/TNSE.2021.3133123},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/XiaoWCMA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/todaes/MahalatMMSC22,
  author       = {Mahabub Hasan Mahalat and
                  Suraj Mandal and
                  Anindan Mondal and
                  Bibhash Sen and
                  Rajat Subhra Chakraborty},
  title        = {Implementation, Characterization and Application of Path Changing
                  Switch based Arbiter {PUF} on {FPGA} as a lightweight Security Primitive
                  for IoT},
  journal      = {{ACM} Trans. Design Autom. Electr. Syst.},
  volume       = {27},
  number       = {3},
  pages        = {26:1--26:26},
  year         = {2022},
  url          = {https://doi.org/10.1145/3491212},
  doi          = {10.1145/3491212},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/todaes/MahalatMMSC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/HeNHZ22,
  author       = {Miao He and
                  Jianbing Ni and
                  Yuanyuan He and
                  Ning Zhang},
  title        = {Low-Complexity Phased-Array Physical Layer Security in Millimeter-Wave
                  Communication for Cybertwin-Driven {V2X} Applications},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {71},
  number       = {5},
  pages        = {4573--4583},
  year         = {2022},
  url          = {https://doi.org/10.1109/TVT.2021.3138702},
  doi          = {10.1109/TVT.2021.3138702},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/HeNHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/MaYXYLY22,
  author       = {Li Ma and
                  Huihong Yang and
                  Jianxiong Xu and
                  Zexian Yang and
                  Qidi Lao and
                  Dong Yuan},
  title        = {Code Analysis with Static Application Security Testing for Python
                  Program},
  journal      = {J. Signal Process. Syst.},
  volume       = {94},
  number       = {11},
  pages        = {1169--1182},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11265-022-01740-z},
  doi          = {10.1007/S11265-022-01740-Z},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vlsisp/MaYXYLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/PadmajaSPCKV22,
  author       = {Mididoddi Padmaja and
                  Shitharth Selvarajan and
                  K. Prasuna and
                  Abhay Chaturvedi and
                  Pravin Kshirsagar and
                  A. Vani},
  title        = {Grow of Artificial Intelligence to Challenge Security in IoT Application},
  journal      = {Wirel. Pers. Commun.},
  volume       = {127},
  number       = {3},
  pages        = {1829--1845},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11277-021-08725-4},
  doi          = {10.1007/S11277-021-08725-4},
  timestamp    = {Thu, 23 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/PadmajaSPCKV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BillawaTFSSS22,
  author       = {Priyanka Billawa and
                  Anusha Bambhore Tukaram and
                  Nicol{\'{a}}s E. D{\'{\i}}az Ferreyra and
                  Jan{-}Philipp Stegh{\"{o}}fer and
                  Riccardo Scandariato and
                  Georg Simhandl},
  title        = {SoK: Security of Microservice Applications: {A} Practitioners' Perspective
                  on Challenges and Best Practices},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {9:1--9:10},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3538986},
  doi          = {10.1145/3538969.3538986},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BillawaTFSSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TseliosPX22,
  author       = {Christos Tselios and
                  Ilias Politis and
                  Christos Xenakis},
  title        = {Improving Network, Data and Application Security for SMEs},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {95:1--95:8},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3544426},
  doi          = {10.1145/3538969.3544426},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/TseliosPX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TukaramSFSZS22,
  author       = {Anusha Bambhore Tukaram and
                  Simon Schneider and
                  Nicol{\'{a}}s E. D{\'{\i}}az Ferreyra and
                  Georg Simhandl and
                  Uwe Zdun and
                  Riccardo Scandariato},
  title        = {Towards a Security Benchmark for the Architectural Design of Microservice
                  Applications},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {116:1--116:7},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3543807},
  doi          = {10.1145/3538969.3543807},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/TukaramSFSZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/accc/GaoXHW22,
  author       = {Siyu Gao and
                  Yuanying Xiao and
                  Ye He and
                  Jianfeng Wen},
  title        = {Mobile Application {SDK} Version Detection and Security Alert Based
                  on Multi-partition {LSH}},
  booktitle    = {3rd Asia Conference on Computers and Communications, {ACCC} 2022,
                  Shanghai, China, December 16-18, 2022},
  pages        = {8--12},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCC58361.2022.00008},
  doi          = {10.1109/ACCC58361.2022.00008},
  timestamp    = {Tue, 03 Oct 2023 19:13:27 +0200},
  biburl       = {https://dblp.org/rec/conf/accc/GaoXHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsos/LinTGHL22,
  author       = {Yuhang Lin and
                  Olufogorehan Tunde{-}Onadele and
                  Xiaohui Gu and
                  Jingzhu He and
                  Hugo Latapie},
  editor       = {Roberto Casadei and
                  Elisabetta Di Nitto and
                  Ilias Gerostathopoulos and
                  Danilo Pianini and
                  Ivana Dusparic and
                  Timothy Wood and
                  Phyllis R. Nelson and
                  Evangelos Pournaras and
                  Nelly Bencomo and
                  Sebastian G{\"{o}}tz and
                  Christian Krupitzer and
                  Claudia Raibulet},
  title        = {{SHIL:} Self-Supervised Hybrid Learning for Security Attack Detection
                  in Containerized Applications},
  booktitle    = {{IEEE} International Conference on Autonomic Computing and Self-Organizing
                  Systems, {ACSOS} 2022, Virtual, CA, USA, September 19-23, 2022},
  pages        = {41--50},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACSOS55765.2022.00022},
  doi          = {10.1109/ACSOS55765.2022.00022},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsos/LinTGHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhip/JiangXLL22,
  author       = {Jiang Jiang and
                  Hanyang Xie and
                  Yuqing Li and
                  Jinman Luo},
  editor       = {Weina Fu and
                  Yun Lin},
  title        = {Application of Cloud Security Terminal in Information Management of
                  Power Industry},
  booktitle    = {Advanced Hybrid Information Processing - 6th {EAI} International Conference,
                  {ADHIP} 2022, Changsha, China, September 29-30, 2022, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {468},
  pages        = {771--783},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-28787-9\_57},
  doi          = {10.1007/978-3-031-28787-9\_57},
  timestamp    = {Fri, 04 Aug 2023 23:41:06 +0200},
  biburl       = {https://dblp.org/rec/conf/adhip/JiangXLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiee/ChenJR22,
  author       = {Zhiwen Chen and
                  Yong Ji and
                  Yuanhong Ren},
  title        = {Research on the Application of Fall Detection Technology Based on
                  the Security Field of the Smart Care for the Elderly},
  booktitle    = {{AIEE} 2022: The 3rd International Conference on Artificial Intelligence
                  in Electronics Engineering, Bangkok Thailand, January 11 - 13, 2022},
  pages        = {75--79},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3512826.3512832},
  doi          = {10.1145/3512826.3512832},
  timestamp    = {Thu, 02 Jun 2022 17:13:52 +0200},
  biburl       = {https://dblp.org/rec/conf/aiee/ChenJR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/OgielaO22,
  author       = {Marek R. Ogiela and
                  Lidia Ogiela},
  editor       = {Leonard Barolli and
                  Farookh Hussain and
                  Tomoya Enokido},
  title        = {Application of Hybrid Intelligence for Security Purposes},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 36th International Conference on Advanced Information Networking
                  and Applications (AINA-2022), Volume 2},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {450},
  pages        = {539--542},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-99587-4\_45},
  doi          = {10.1007/978-3-030-99587-4\_45},
  timestamp    = {Thu, 31 Mar 2022 15:30:21 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/OgielaO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/PaccamiccioM22,
  author       = {Mattia Paccamiccio and
                  Leonardo Mostarda},
  editor       = {Leonard Barolli and
                  Farookh Hussain and
                  Tomoya Enokido},
  title        = {Reasoning About Inter-procedural Security Requirements in IoT Applications},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 36th International Conference on Advanced Information Networking
                  and Applications (AINA-2022), Volume 3},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {451},
  pages        = {245--254},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-99619-2\_24},
  doi          = {10.1007/978-3-030-99619-2\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/PaccamiccioM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/0001JDSFK22,
  author       = {Priyanka Dutta and
                  Mei Jiang and
                  Dung Hoang Duong and
                  Willy Susilo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Hierarchical Identity-based Puncturable Encryption from Lattices with
                  Application to Forward Security},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {408--422},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3517400},
  doi          = {10.1145/3488932.3517400},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiaccs/0001JDSFK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bisec/NikolicZFA22,
  author       = {Sara Nikolic and
                  Nemanja Zdravkovic and
                  Igor Franc and
                  N. Arivazhagan},
  editor       = {Nemanja Zdravkovic and
                  Dragan Domazet and
                  Sonsoles L{\'{o}}pez{-}Pernas and
                  Miguel {\'{A}}ngel Conde and
                  Ponnusamy Vijayakumar},
  title        = {A Comparison on Hyperledger Consensus Mechanism Security and their
                  Applications},
  booktitle    = {Proceedings of the 13th International Conference on Business Information
                  Security (BISEC-2022), Belgrade, Serbia, December 02, 2022},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3529},
  pages        = {34--41},
  publisher    = {CEUR-WS.org},
  year         = {2022},
  url          = {https://ceur-ws.org/Vol-3529/short\_5.pdf},
  timestamp    = {Tue, 19 Dec 2023 17:15:12 +0100},
  biburl       = {https://dblp.org/rec/conf/bisec/NikolicZFA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbd/WenTCZLZ22,
  author       = {Jing Wen and
                  Chaohong Tan and
                  Jining Chen and
                  Qin Zhao and
                  Sen Li and
                  Fei Zhou},
  title        = {The Application of RNN-based {API} Data Security Detection in Government
                  Cloud Service},
  booktitle    = {Tenth International Conference on Advanced Cloud and Big Data, {CBD}
                  2022, Guilin, China, November 4-5, 2022},
  pages        = {276--281},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CBD58033.2022.00056},
  doi          = {10.1109/CBD58033.2022.00056},
  timestamp    = {Wed, 08 Feb 2023 17:46:14 +0100},
  biburl       = {https://dblp.org/rec/conf/cbd/WenTCZLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/TaylorCHNRZT22,
  author       = {Curtis R. Taylor and
                  Jason M. Carter and
                  Shean Huff and
                  Eric Nafziger and
                  Jackeline Rios{-}Torres and
                  Bob Zhang and
                  Joseph Turcotte},
  title        = {Evaluating Efficiency and Security of Connected and Autonomous Vehicle
                  Applications},
  booktitle    = {19th {IEEE} Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2022, Las Vegas, NV, USA, January 8-11, 2022},
  pages        = {236--239},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CCNC49033.2022.9700691},
  doi          = {10.1109/CCNC49033.2022.9700691},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/TaylorCHNRZT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001S0Y22,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Sugawara and
                  Kan Yasuda},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {The Multi-User Security of Triple Encryption, Revisited: Exact Security,
                  Strengthening, and Application to {TDES}},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {2323--2336},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560674},
  doi          = {10.1145/3548606.3560674},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0001S0Y22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuoWC22,
  author       = {Yunpeng Luo and
                  Ziwen Wan and
                  Qi Alfred Chen},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Poster: Towards Complete Computation Graph Generation for Security
                  Assessment of {ROS} Applications},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3411--3413},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3563540},
  doi          = {10.1145/3548606.3563540},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuoWC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coins/BoppanaB22,
  author       = {Tej Kiran Boppana and
                  Priyanka Bagade},
  title        = {Security risks in MQTT-based Industrial IoT Applications},
  booktitle    = {{IEEE} International Conference on Omni-layer Intelligent Systems,
                  {COINS} 2022, Barcelona, Spain, August 1-3, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/COINS54846.2022.9854993},
  doi          = {10.1109/COINS54846.2022.9854993},
  timestamp    = {Fri, 26 Aug 2022 16:30:17 +0200},
  biburl       = {https://dblp.org/rec/conf/coins/BoppanaB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coms2/Moon22,
  author       = {Sunil K. Moon},
  editor       = {Nirbhay Chaubey and
                  Sabu M. Thampi and
                  Noor Zaman Jhanjhi},
  title        = {Application of Forensic Audio-Video Steganography Technique to Improve
                  Security, Robustness, and Authentication of Secret Data},
  booktitle    = {Computing Science, Communication and Security - Third International
                  Conference, {COMS2} 2022, Gujarat, India, February 6-7, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1604},
  pages        = {11--25},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-10551-7\_2},
  doi          = {10.1007/978-3-031-10551-7\_2},
  timestamp    = {Mon, 06 Nov 2023 12:57:51 +0100},
  biburl       = {https://dblp.org/rec/conf/coms2/Moon22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/HoglundR22,
  author       = {Joel H{\"{o}}glund and
                  Shahid Raza},
  title        = {{BLEND:} Efficient and blended IoT data storage and communication
                  with application layer security},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2022, Rhodes, Greece, July 27-29, 2022},
  pages        = {253--260},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSR54599.2022.9850290},
  doi          = {10.1109/CSR54599.2022.9850290},
  timestamp    = {Fri, 19 Aug 2022 14:18:24 +0200},
  biburl       = {https://dblp.org/rec/conf/csr2/HoglundR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/StockME22,
  author       = {Sebastian Stock and
                  Atif Mashkoor and
                  Alexander Egyed},
  editor       = {Gabriele Kotsis and
                  A Min Tjoa and
                  Ismail Khalil and
                  Bernhard Moser and
                  Alfred Taudes and
                  Atif Mashkoor and
                  Johannes Sametinger and
                  Jorge Mart{\'{\i}}nez Gil and
                  Florian Sobieczky and
                  Lukas Fischer and
                  Rudolf Ramler and
                  Maqbool Khan and
                  Gerald Czech},
  title        = {Application of Validation Obligations to Security Concerns},
  booktitle    = {Database and Expert Systems Applications - {DEXA} 2022 Workshops -
                  33rd International Conference, {DEXA} 2022, Vienna, Austria, August
                  22-24, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1633},
  pages        = {337--346},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-14343-4\_31},
  doi          = {10.1007/978-3-031-14343-4\_31},
  timestamp    = {Mon, 26 Jun 2023 20:42:59 +0200},
  biburl       = {https://dblp.org/rec/conf/dexaw/StockME22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drc/GalderisiMT22,
  author       = {Giulio Galderisi and
                  Thomas Mikolajick and
                  Jens Trommer},
  title        = {Robust Reconfigurable Field Effect Transistors Process Route Enabling
                  Multi-VT Devices Fabrication for Hardware Security Applications},
  booktitle    = {Device Research Conference, {DRC} 2022, Columbus, OH, USA, June 26-29,
                  2022},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DRC55272.2022.9855805},
  doi          = {10.1109/DRC55272.2022.9855805},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drc/GalderisiMT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsit/LiMDC22,
  author       = {Yong Li and
                  Chen Mu and
                  Zaojian Dai and
                  Lu Chen},
  title        = {Security situation awareness method of power mobile application based
                  on big data architecture},
  booktitle    = {5th International Conference on Data Science and Information Technology,
                  {DSIT} 2022, Shanghai, China, July 22-24, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSIT55514.2022.9943899},
  doi          = {10.1109/DSIT55514.2022.9943899},
  timestamp    = {Thu, 24 Nov 2022 14:56:16 +0100},
  biburl       = {https://dblp.org/rec/conf/dsit/LiMDC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/DeligiannisCRTV22,
  author       = {Nikolaos Ioannis Deligiannis and
                  Riccardo Cantoro and
                  Matteo Sonza Reorda and
                  Marcello Traiola and
                  Emanuele Valea},
  title        = {Improving the Fault Resilience of Neural Network Applications Through
                  Security Mechanisms},
  booktitle    = {52nd Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2022, Supplemental Volume, Baltimore, MD, USA,
                  June 27-30, 2022},
  pages        = {23--24},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSN-S54099.2022.00017},
  doi          = {10.1109/DSN-S54099.2022.00017},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/DeligiannisCRTV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dtesi/RazaqueAAKA22,
  author       = {Abdul Razaque and
                  Saule Amanzholova and
                  Amir Akimbayev and
                  Emil Kovalenko and
                  Dilnaz Ashimzhanova},
  editor       = {Askar Khikmetov and
                  Yevgeniya A. Daineko and
                  Madina T. Ipalakova},
  title        = {Development System of Application Security Testing},
  booktitle    = {Proceedings of the 7th International Conference on Digital Technologies
                  in Education, Science and Industry {(DTESI} 2022), Almaty, Kazakhstan,
                  October 20-21, 2022},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3382},
  publisher    = {CEUR-WS.org},
  year         = {2022},
  url          = {https://ceur-ws.org/Vol-3382/Short3.pdf},
  timestamp    = {Thu, 31 Aug 2023 17:03:37 +0200},
  biburl       = {https://dblp.org/rec/conf/dtesi/RazaqueAAKA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecir/JanzenOT22,
  author       = {Shawn Janzen and
                  Carolin Orr and
                  Sara{-}Jayne Terp},
  editor       = {Marinella Petrocchi and
                  Marco Viviani},
  title        = {Cognitive Security and Resilience: {A} Social Ecological Model of
                  Disinformation and other Harms with Applications to {COVID-19} Vaccine
                  Information Behaviors},
  booktitle    = {Proceedings of the 2nd Workshop Reducing Online Misinformation through
                  Credible Information Retrieval 2022 co-located with The 44th European
                  Conference on Information Retrieval {(ECIR} 2022), Stavanger, Norway,
                  April 10, 2022},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3138},
  pages        = {48--88},
  publisher    = {CEUR-WS.org},
  year         = {2022},
  url          = {https://ceur-ws.org/Vol-3138/paper4\_jot.pdf},
  timestamp    = {Mon, 21 Aug 2023 07:59:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ecir/JanzenOT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eitce/PengYLZH22,
  author       = {Jiao Peng and
                  Shulin Yang and
                  Xiang Li and
                  Meiqi Zhou and
                  Yongliang Huang},
  title        = {Research on the Application of Digital Education Resource Data Security
                  Sharing Based on Blockchain and Access Control},
  booktitle    = {Proceedings of the 2022 6th International Conference on Electronic
                  Information Technology and Computer Engineering, {EITCE} 2022, Xiamen,
                  China, October 21-23, 2022},
  pages        = {1179--1184},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3573428.3573639},
  doi          = {10.1145/3573428.3573639},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eitce/PengYLZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/Link22,
  author       = {Sebastian Link},
  editor       = {Jolita Ralyt{\'{e}} and
                  Sharma Chakravarthy and
                  Mukesh K. Mohania and
                  Manfred A. Jeusfeld and
                  Kamalakar Karlapalem},
  title        = {Object Normal Form, Fourth Normal Form and Their Application to Database
                  Security},
  booktitle    = {Conceptual Modeling - 41st International Conference, {ER} 2022, Hyderabad,
                  India, October 17-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13607},
  pages        = {349--364},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17995-2\_25},
  doi          = {10.1007/978-3-031-17995-2\_25},
  timestamp    = {Wed, 22 Mar 2023 17:54:58 +0100},
  biburl       = {https://dblp.org/rec/conf/er/Link22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/TanZ22,
  author       = {Teik Guan Tan and
                  Jianying Zhou},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Nicola Dragoni},
  title        = {Migrating Blockchains Away from {ECDSA} for Post-quantum Security:
                  {A} Study of Impact on Users and Applications},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2022 International Workshops, {DPM} 2022 and {CBT} 2022,
                  Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13619},
  pages        = {308--316},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25734-6\_19},
  doi          = {10.1007/978-3-031-25734-6\_19},
  timestamp    = {Tue, 28 Feb 2023 08:10:09 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/TanZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etfa/Khan22,
  author       = {Muhammad Taimoor Khan},
  title        = {Towards Practical and Formal Security Risk Analysis of IoT (Internet
                  of Things) Applications},
  booktitle    = {27th {IEEE} International Conference on Emerging Technologies and
                  Factory Automation, {ETFA} 2022, Stuttgart, Germany, September 6-9,
                  2022},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ETFA52439.2022.9921511},
  doi          = {10.1109/ETFA52439.2022.9921511},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/etfa/Khan22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Huguenin-Dumittan22,
  author       = {Lo{\"{\i}}s Huguenin{-}Dumittan and
                  Serge Vaudenay},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {On IND-qCCA Security in the {ROM} and Its Applications - {CPA} Security
                  Is Sufficient for {TLS} 1.3},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13277},
  pages        = {613--642},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07082-2\_22},
  doi          = {10.1007/978-3-031-07082-2\_22},
  timestamp    = {Tue, 31 May 2022 17:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Huguenin-Dumittan22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euromicro/RahmanI22,
  author       = {Karishma Rahman and
                  Clemente Izurieta},
  editor       = {Gustavo Marrero Callic{\'{o}} and
                  Regina Hebig and
                  Andreas Wortmann},
  title        = {A Mapping Study of Security Vulnerability Detection Approaches for
                  Web Applications},
  booktitle    = {48th Euromicro Conference on Software Engineering and Advanced Applications,
                  {SEAA} 2022, Maspalomas, Gran Canaria, Spain, 31 August - 2 September
                  2022},
  pages        = {491--494},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SEAA56994.2022.00081},
  doi          = {10.1109/SEAA56994.2022.00081},
  timestamp    = {Wed, 15 Feb 2023 22:07:57 +0100},
  biburl       = {https://dblp.org/rec/conf/euromicro/RahmanI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficloud/ArtychBCNPPW22,
  author       = {Rafal Artych and
                  Krzysztof Bocianiak and
                  Yannick Carlinet and
                  Wojciech Niewolski and
                  Nancy Perrot and
                  Aleksandra Podlasek and
                  Jean{-}Philippe Wary},
  editor       = {Muhammad Younas and
                  Irfan Awan and
                  Wenny Rahayu},
  title        = {Security Constraints for Placement of Latency Sensitive 5G {MEC} Applications},
  booktitle    = {9th International Conference on Future Internet of Things and Cloud,
                  FiCloud 2022, Rome, Italy, August 22-24, 2022},
  pages        = {40--45},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/FiCloud57274.2022.00013},
  doi          = {10.1109/FICLOUD57274.2022.00013},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ficloud/ArtychBCNPPW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ftc/GirmaGI22,
  author       = {Anteneh Girma and
                  Michelle A. Guo and
                  John Irungu},
  editor       = {Kohei Arai},
  title        = {Identifying Shared Security Vulnerabilities and Mitigation Strategies
                  at the Intersection of Application Programming Interfaces (APIs),
                  Application-Level and Operating System {(OS)} of Mobile Devices},
  booktitle    = {Proceedings of the Future Technologies Conference, {FTC} 2022, Virtual
                  Event, 20-21 October 2022, Volume 2},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {560},
  pages        = {499--513},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-18458-1\_34},
  doi          = {10.1007/978-3-031-18458-1\_34},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ftc/GirmaGI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/BoddupalliODCR22,
  author       = {Srivalli Boddupalli and
                  Richard Owoputi and
                  Chengwei Duan and
                  Tashfique Hasnine Choudhury and
                  Sandip Ray},
  editor       = {Ioannis Savidis and
                  Avesta Sasan and
                  Himanshu Thapliyal and
                  Ronald F. DeMara},
  title        = {Resiliency in Connected Vehicle Applications: Challenges and Approaches
                  for Security Validation},
  booktitle    = {{GLSVLSI} '22: Great Lakes Symposium on {VLSI} 2022, Irvine {CA} USA,
                  June 6 - 8, 2022},
  pages        = {475--480},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3526241.3530832},
  doi          = {10.1145/3526241.3530832},
  timestamp    = {Mon, 16 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/BoddupalliODCR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/Salmani22a,
  author       = {Hassan Salmani},
  editor       = {Ioannis Savidis and
                  Avesta Sasan and
                  Himanshu Thapliyal and
                  Ronald F. DeMara},
  title        = {Session details: Session 6B: Special Session - 2: Application-oriented
                  Hardware Security Challenges and Solutions},
  booktitle    = {{GLSVLSI} '22: Great Lakes Symposium on {VLSI} 2022, Irvine {CA} USA,
                  June 6 - 8, 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3542693},
  doi          = {10.1145/3542693},
  timestamp    = {Fri, 03 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/Salmani22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/MirandaGSNA22,
  author       = {Mario Miranda and
                  Kevin Granda and
                  David R. Castillo Salazar and
                  Guillermo Palacios Navarro and
                  Jos{\'{e}} Varela Ald{\'{a}}s},
  editor       = {Constantine Stephanidis and
                  Margherita Antona and
                  Stavroula Ntoa},
  title        = {Monitoring Security in a Vehicle Using a Mobile Application},
  booktitle    = {{HCI} International 2022 Posters - 24th International Conference on
                  Human-Computer Interaction, {HCII} 2022, Virtual Event, June 26 -
                  July 1, 2022, Proceedings, Part {IV}},
  series       = {Communications in Computer and Information Science},
  volume       = {1583},
  pages        = {239--244},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06394-7\_31},
  doi          = {10.1007/978-3-031-06394-7\_31},
  timestamp    = {Sun, 02 Oct 2022 16:02:13 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/MirandaGSNA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3i/KwatraJRBBC22,
  author       = {Chetna Vaid Kwatra and
                  Anupam Jain and
                  Angelina Royappa and
                  Susama Bagchi and
                  S. B. G. Tilak Babu and
                  Harish Chowdhary},
  title        = {Artificial Intelligence Application for Security Issues and Challenges
                  in IoT},
  booktitle    = {5th International Conference on Contemporary Computing and Informatics,
                  {IC3I} 2022, Uttar Pradesh, India, December 14-16, 2022},
  pages        = {2100--2104},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IC3I56241.2022.10072808},
  doi          = {10.1109/IC3I56241.2022.10072808},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ic3i/KwatraJRBBC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3i/MakkaMDKKP22,
  author       = {Shanti Makka and
                  Tripti Misra and
                  Rajesh Deorari and
                  Deepak Kumar and
                  Vikas Kumar and
                  Bhaker Pant},
  title        = {A Structured Investigation of Network Security Strategies and its
                  Applications},
  booktitle    = {5th International Conference on Contemporary Computing and Informatics,
                  {IC3I} 2022, Uttar Pradesh, India, December 14-16, 2022},
  pages        = {52--56},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IC3I56241.2022.10072695},
  doi          = {10.1109/IC3I56241.2022.10072695},
  timestamp    = {Sat, 25 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic3i/MakkaMDKKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3i/MakkaSRSRS22,
  author       = {Shanthi Makka and
                  K. Sreenivasulu and
                  B. S. Rawat and
                  Komal Saxena and
                  S. Rajasulochana and
                  Surendra Kumar Shukla},
  title        = {Application of Blockchain and Internet of Things (IoT) for Ensuring
                  Privacy and Security of Health Records and Medical Services},
  booktitle    = {5th International Conference on Contemporary Computing and Informatics,
                  {IC3I} 2022, Uttar Pradesh, India, December 14-16, 2022},
  pages        = {84--88},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IC3I56241.2022.10072427},
  doi          = {10.1109/IC3I56241.2022.10072427},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ic3i/MakkaSRSRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3i/VigHKSJK22,
  author       = {Heena Vig and
                  Shaikh Abdul Hannan and
                  Ashok Kumar and
                  Rajshree Singh and
                  Juhi Juwairiyyah and
                  Neenu Kuriakose},
  title        = {Gender and Age Classification Enabled Blockchain Security Mechanism
                  for assisting Mobile Application},
  booktitle    = {5th International Conference on Contemporary Computing and Informatics,
                  {IC3I} 2022, Uttar Pradesh, India, December 14-16, 2022},
  pages        = {1123--1128},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IC3I56241.2022.10073014},
  doi          = {10.1109/IC3I56241.2022.10073014},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ic3i/VigHKSJK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icca2/RafaRMHRN22,
  author       = {Fahmida Rafa and
                  Zinnet Rahman and
                  Md Mahbub Mishu and
                  Morad Hasan and
                  Raiyan Rahman and
                  Dip Nandi},
  title        = {Detecting Intrusion in Cloud using Snort: An Application towards Cyber-Security},
  booktitle    = {{ICCA} 2022: 2nd International Conference on Computing Advancements,
                  Dhaka, Bangladesh, March 10 - 12, 2022},
  pages        = {199--206},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3542954.3542984},
  doi          = {10.1145/3542954.3542984},
  timestamp    = {Wed, 17 Aug 2022 14:26:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icca2/RafaRMHRN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ShiCJ22,
  author       = {Jing Shi and
                  Mingyang Chen and
                  Jiazheng Jiao},
  editor       = {Xingming Sun and
                  Xiaorui Zhang and
                  Zhihua Xia and
                  Elisa Bertino},
  title        = {Thoughts on the Application of Low-Interactive Honeypot Based on Raspberry
                  Pi in Public Security Actual Combat, {LIHRP}},
  booktitle    = {Artificial Intelligence and Security - 8th International Conference,
                  {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13340},
  pages        = {144--156},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06791-4\_12},
  doi          = {10.1007/978-3-031-06791-4\_12},
  timestamp    = {Tue, 02 Aug 2022 22:23:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ShiCJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccir/ZhangL22,
  author       = {Jiqiang Zhang and
                  Pengcheng Liu},
  title        = {Application of edge computing in intelligent security system},
  booktitle    = {Proceedings of the 2nd International Conference on Control and Intelligent
                  Robotics, {ICCIR} 2022, Nanjing, China, June 24-26, 2022},
  pages        = {216--220},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548608.3559195},
  doi          = {10.1145/3548608.3559195},
  timestamp    = {Wed, 26 Oct 2022 14:31:02 +0200},
  biburl       = {https://dblp.org/rec/conf/iccir/ZhangL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/XiongGZZ22,
  author       = {Xinli Xiong and
                  Liang Guo and
                  Yunfeng Zhang and
                  Jingye Zhang},
  title        = {Cyber-Security Enhanced Network Meta-Model and its Application},
  booktitle    = {6th International Conference on Cryptography, Security and Privacy,
                  {CSP} 2022, Tianjin, China, January 14-16, 2022},
  pages        = {80--85},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSP55486.2022.00023},
  doi          = {10.1109/CSP55486.2022.00023},
  timestamp    = {Mon, 06 Nov 2023 13:06:30 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/XiongGZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciap/LioupisDMKAGMCL21,
  author       = {Panagiotis Lioupis and
                  Aris Dadoukis and
                  Evangelos Maltezos and
                  Lazaros Karagiannidis and
                  Angelos Amditis and
                  Maite Gonz{\'{a}}lez and
                  Jon Martin and
                  David Cantero and
                  Mikel Larra{\~{n}}aga},
  editor       = {Pier Luigi Mazzeo and
                  Emanuele Frontoni and
                  Stan Sclaroff and
                  Cosimo Distante},
  title        = {Embedded Intelligence for Safety and Security Machine Vision Applications},
  booktitle    = {Image Analysis and Processing. {ICIAP} 2022 Workshops - {ICIAP} International
                  Workshops, Lecce, Italy, May 23-27, 2022, Revised Selected Papers,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13374},
  pages        = {37--46},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-13324-4\_4},
  doi          = {10.1007/978-3-031-13324-4\_4},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciap/LioupisDMKAGMCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icist/ZahidAAAM22,
  author       = {Rimsha Zahid and
                  Muhammad Waseem Anwar and
                  Farooque Azam and
                  Anam Amjad and
                  Danish Mukhtar},
  editor       = {Audrius Lopata and
                  Daina Gudoniene and
                  Rita Butkiene},
  title        = {Enhancing End-to-End Communication Security in IoT Devices Through
                  Application Layer Protocol},
  booktitle    = {Information and Software Technologies - 28th International Conference,
                  {ICIST} 2022, Kaunas, Lithuania, October 13-15, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1665},
  pages        = {148--159},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-16302-9\_11},
  doi          = {10.1007/978-3-031-16302-9\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icist/ZahidAAAM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitee/WuDX22,
  author       = {Guofang Wu and
                  Guoliang Dong and
                  Shuquan Xu},
  title        = {Application of Personnel Safety Management System in Network Security
                  Guarantee},
  booktitle    = {Proceedings of the 5th International Conference on Information Technologies
                  and Electrical Engineering, {ICITEE} 2022, Changsha, China, November
                  4-6, 2022},
  pages        = {714--718},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3582935.3583055},
  doi          = {10.1145/3582935.3583055},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitee/WuDX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icr2/AdelBESFB22,
  author       = {Basant Adel and
                  Asmaa Badran and
                  Nada E. Elshami and
                  Ahmad Salah and
                  Ahmed Fathalla and
                  Mahmoud Bekhit},
  editor       = {Kevin Daimi and
                  Abeer Alsadoon},
  title        = {A Survey on Deep Learning Architectures in Human Activities Recognition
                  Application in Sports Science, Healthcare, and Security},
  booktitle    = {Proceedings of the ICR'22 International Conference on Innovations
                  in Computing Research, Athens, Greece, 29-31 August, 2022},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1431},
  pages        = {121--134},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-14054-9\_13},
  doi          = {10.1007/978-3-031-14054-9\_13},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icr2/AdelBESFB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icseb/AgnoGCVI22,
  author       = {Miguel Abhram Agno and
                  Anna Patricia De Guia and
                  Danilo Dela Cruz and
                  Paul Jericho Marcos Vale and
                  Grace Lorraine D. Intal},
  title        = {A Study on the Design of Pandora's Box Web Application Using Design
                  Thinking approach: {A} study on a centralized web browser security
                  extension design and planned realization},
  booktitle    = {6th International Conference on Software and e-Business, {ICSEB} 2022,
                  Shenzhen, China, December 9-11, 2022},
  pages        = {89--96},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3578997.3579006},
  doi          = {10.1145/3578997.3579006},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icseb/AgnoGCVI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/RahkemaP22,
  author       = {Kristiina Rahkema and
                  Dietmar Pfahl},
  title        = {Quality Analysis of iOS Applications with Focus on Maintainability
                  and Security},
  booktitle    = {{IEEE} International Conference on Software Maintenance and Evolution,
                  {ICSME} 2022, Limassol, Cyprus, October 3-7, 2022},
  pages        = {602--606},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICSME55016.2022.00083},
  doi          = {10.1109/ICSME55016.2022.00083},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icsm/RahkemaP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm2/MimoM22,
  author       = {Edgard Musafiri Mimo and
                  Troy McDaniel},
  editor       = {Stefano Berretti and
                  Guan{-}Ming Su},
  title        = {Security Concerns and Citizens' Privacy Implications in Smart Multimedia
                  Applications},
  booktitle    = {Smart Multimedia - Third International Conference, {ICSM} 2022, Marseille,
                  France, August 25-27, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13497},
  pages        = {107--115},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22061-6\_8},
  doi          = {10.1007/978-3-031-22061-6\_8},
  timestamp    = {Fri, 16 Dec 2022 15:59:57 +0100},
  biburl       = {https://dblp.org/rec/conf/icsm2/MimoM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/SalazarCMSZR22,
  author       = {Zujany Salazar and
                  Ana Rosa Cavalli and
                  Wissam Mallouli and
                  Filip Sebek and
                  Fatiha Za{\"{\i}}di and
                  Monika Ewa Rakoczy},
  title        = {Monitoring Approaches for Security and Safety Analysis: Application
                  to a Load Position System},
  booktitle    = {15th {IEEE} International Conference on Software Testing, Verification
                  and Validation Workshops {ICST} Workshops 2022, Valencia, Spain, April
                  4-13, 2022},
  pages        = {40--48},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICSTW55395.2022.00021},
  doi          = {10.1109/ICSTW55395.2022.00021},
  timestamp    = {Mon, 13 Jun 2022 16:53:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icst/SalazarCMSZR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict4d/MathijssenT22,
  author       = {Maxine Mathijssen and
                  Maureen Tanner},
  editor       = {Yingqin Zheng and
                  Pamela Abbott and
                  Jose Antonio Robles{-}Flores},
  title        = {The Use of a User-Centric Smart Mobile Application Prototype for Supporting
                  Safety and Security in a City: {A} Design Science Method},
  booktitle    = {Freedom and Social Inclusion in a Connected World - 17th {IFIP} {WG}
                  9.4 International Conference on Implications of Information and Digital
                  Technologies for Development, {ICT4D} 2022, Lima, Peru, May 25-27,
                  2022, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {657},
  pages        = {270--294},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-19429-0\_17},
  doi          = {10.1007/978-3-031-19429-0\_17},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ict4d/MathijssenT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictc/RahmanHJ22,
  author       = {Anichur Rahman and
                  Kamrul Hasan and
                  Seong{-}Ho Jeong},
  title        = {An Enhanced Security Architecture for Industry 4.0 Applications based
                  on Software-Defined Networking},
  booktitle    = {13th International Conference on Information and Communication Technology
                  Convergence, {ICTC} 2022, Jeju Island, Korea, Republic of, October
                  19-21, 2022},
  pages        = {2127--2130},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICTC55196.2022.9952633},
  doi          = {10.1109/ICTC55196.2022.9952633},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ictc/RahmanHJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idsta/KundaA22,
  author       = {Mohammed Ali Kunda and
                  Izzat Alsmadi},
  editor       = {Mohammad A. Alsmirat and
                  Yaser Jararweh and
                  Moayad Aloqaily and
                  Izzat Alsmadi},
  title        = {Practical web security testing: Evolution of web application modules
                  and open source testing tools},
  booktitle    = {3rd International Conference on Intelligent Data Science Technologies
                  and Applications, {IDSTA} 2022, San Antonio, TX, USA, September 5-7,
                  2022},
  pages        = {152--155},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IDSTA55301.2022.9923130},
  doi          = {10.1109/IDSTA55301.2022.9923130},
  timestamp    = {Thu, 10 Nov 2022 11:54:13 +0100},
  biburl       = {https://dblp.org/rec/conf/idsta/KundaA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iisa/GuA22,
  author       = {Siyao Gu and
                  Miltiadis Alamaniotis},
  editor       = {Nikolaos G. Bourbakis and
                  George A. Tsihrintzis and
                  Maria Virvou},
  title        = {Radiation Sensor Placement using Reinforcement Learning in Nuclear
                  Security Applications},
  booktitle    = {13th International Conference on Information, Intelligence, Systems
                  {\&} Applications, {IISA} 2022, Corfu, Greece, July 18-20, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IISA56318.2022.9904349},
  doi          = {10.1109/IISA56318.2022.9904349},
  timestamp    = {Fri, 18 Nov 2022 11:48:30 +0100},
  biburl       = {https://dblp.org/rec/conf/iisa/GuA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indin/AllisonSM22,
  author       = {David Allison and
                  Paul Smith and
                  Kieran McLaughlin},
  title        = {Digital Twin-Enhanced Methodology for Training Edge-Based Models for
                  Cyber Security Applications},
  booktitle    = {20th {IEEE} International Conference on Industrial Informatics, {INDIN}
                  2022, Perth, Australia, July 25-28, 2022},
  pages        = {226--232},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/INDIN51773.2022.9976095},
  doi          = {10.1109/INDIN51773.2022.9976095},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indin/AllisonSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotbd/RuddC22,
  author       = {Steph Rudd and
                  Hamish Cunningham},
  editor       = {Denis Bastieri and
                  Gary B. Wills and
                  P{\'{e}}ter Kacsuk and
                  Victor Chang},
  title        = {Threat Modelling with the {GDPR} towards a Security and Privacy Metrics
                  Framework for IoT Smart-farm Application},
  booktitle    = {Proceedings of the 7th International Conference on Internet of Things,
                  Big Data and Security, IoTBDS 2022, Online Streaming, April 22-24,
                  2022},
  pages        = {91--102},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010920800003194},
  doi          = {10.5220/0010920800003194},
  timestamp    = {Tue, 06 Jun 2023 14:58:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iotbd/RuddC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isami/AbbasiPM22,
  author       = {Mahmoud Abbasi and
                  Marta Plaza{-}Hern{\'{a}}ndez and
                  Yeray Mezquita},
  editor       = {Vicente Juli{\'{a}}n and
                  Jo{\~{a}}o Carneiro and
                  Ricardo S. Alonso and
                  Pablo Chamoso and
                  Paulo Novais},
  title        = {Security of IoT Application Layer: Requirements, Threats, and Solutions},
  booktitle    = {Ambient Intelligence - Software and Applications - 13th International
                  Symposium on Ambient Intelligence, ISAmI 2022, L'Aquila, Italy, 13-15
                  July, 2022},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {603},
  pages        = {86--100},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22356-3\_9},
  doi          = {10.1007/978-3-031-22356-3\_9},
  timestamp    = {Tue, 05 Sep 2023 09:14:36 +0200},
  biburl       = {https://dblp.org/rec/conf/isami/AbbasiPM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/KarnZJE22,
  author       = {Rupesh Raj Karn and
                  Matthew Ziegler and
                  Jinwook Jung and
                  Ibrahim Abe M. Elfadel},
  title        = {Hyper-parameter Tuning for Progressive Learning and its Application
                  to Network Cyber Security},
  booktitle    = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2022,
                  Austin, TX, USA, May 27 - June 1, 2022},
  pages        = {1220--1224},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISCAS48785.2022.9937433},
  doi          = {10.1109/ISCAS48785.2022.9937433},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscas/KarnZJE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isncc/ZrelliNE22,
  author       = {Amira Zrelli and
                  Cherifa Nakkach and
                  Tahar Ezzedine},
  title        = {Cyber-Security for IoT Applications based on {ANN} Algorithm},
  booktitle    = {International Symposium on Networks, Computers and Communications,
                  {ISNCC} 2022, Shenzhen, China, July 19-22, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISNCC55209.2022.9851715},
  doi          = {10.1109/ISNCC55209.2022.9851715},
  timestamp    = {Sun, 07 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isncc/ZrelliNE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itc/KibriaRFT22,
  author       = {Rasheed Kibria and
                  M. Sazadur Rahman and
                  Farimah Farahmandi and
                  Mark M. Tehranipoor},
  title        = {RTL-FSMx: Fast and Accurate Finite State Machine Extraction at the
                  {RTL} for Security Applications},
  booktitle    = {{IEEE} International Test Conference, {ITC} 2022, Anaheim, CA, USA,
                  September 23-30, 2022},
  pages        = {165--174},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ITC50671.2022.00024},
  doi          = {10.1109/ITC50671.2022.00024},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itc/KibriaRFT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itc/StellariS22,
  author       = {Franco Stellari and
                  Peilin Song},
  title        = {Reliability Study of 14 nm Scan Chains and Its Application to Hardware
                  Security},
  booktitle    = {{IEEE} International Test Conference, {ITC} 2022, Anaheim, CA, USA,
                  September 23-30, 2022},
  pages        = {28--35},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ITC50671.2022.00009},
  doi          = {10.1109/ITC50671.2022.00009},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itc/StellariS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iti2/PleskachZBPV22,
  author       = {Valentyna Pleskach and
                  Viacheslav V. Zosimov and
                  Oleksandra S. Bulgakova and
                  Mariia Pleskach and
                  Eva Volnyanska},
  editor       = {Anatoly Anisimov and
                  Vitaliy Snytyuk and
                  Aldrich Chris and
                  Andreas Pester and
                  Fr{\'{e}}d{\'{e}}ric Mallet and
                  Hiroshi Tanaka and
                  Iurii Krak and
                  Karsten Henke and
                  Oleg Chertov and
                  Oleksandr Marchenko and
                  S{\'{a}}ndor Boz{\'{o}}ki and
                  Vitaliy V. Tsyganok and
                  Vladimir Vovk},
  title        = {{C2C} Application as an Example of Eshop for Handmade: Tools, Security
                  Issues, Basic Technologies},
  booktitle    = {Selected Papers of the {IX} International Scientific Conference "Information
                  Technology and Implementation" (IT{\&}I-2022). Conference Proceedings
                  Kyiv, Ukraine, November 30 - December 02, 2022},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3347},
  pages        = {148--158},
  publisher    = {CEUR-WS.org},
  year         = {2022},
  url          = {https://ceur-ws.org/Vol-3347/Paper\_13.pdf},
  timestamp    = {Wed, 13 Sep 2023 14:01:43 +0200},
  biburl       = {https://dblp.org/rec/conf/iti2/PleskachZBPV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itsc/BoddupalliCLR22,
  author       = {Srivalli Boddupalli and
                  Venkata Sai Gireesh Chamarthi and
                  Chung{-}Wei Lin and
                  Sandip Ray},
  title        = {{CAVELIER:} Automated Security Evaluation for Connected Autonomous
                  Vehicle Applications},
  booktitle    = {25th {IEEE} International Conference on Intelligent Transportation
                  Systems, {ITSC} 2022, Macau, China, October 8-12, 2022},
  pages        = {4335--4340},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ITSC55140.2022.9921825},
  doi          = {10.1109/ITSC55140.2022.9921825},
  timestamp    = {Thu, 10 Nov 2022 21:13:36 +0100},
  biburl       = {https://dblp.org/rec/conf/itsc/BoddupalliCLR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwssip/Zeneli22,
  author       = {Manjola Zeneli},
  title        = {Pathway of applications of cyber security standards and rules in Albania},
  booktitle    = {29th International Conference on Systems, Signals and Image Processing,
                  {IWSSIP} 2022, Sofia, Bulgaria, June 1-3, 2022},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IWSSIP55020.2022.9854492},
  doi          = {10.1109/IWSSIP55020.2022.9854492},
  timestamp    = {Fri, 26 Aug 2022 16:30:18 +0200},
  biburl       = {https://dblp.org/rec/conf/iwssip/Zeneli22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mwscas/DivyanshuKKAM22,
  author       = {Divyanshu Divyanshu and
                  Rajat Kumar and
                  Danial Khan and
                  Selma Amara and
                  Yehia Massoud},
  title        = {Physically Unclonable Function using {GSHE} driven {SOT} assisted
                  {MTJ} for next Generation Hardware Security Applications},
  booktitle    = {65th {IEEE} International Midwest Symposium on Circuits and Systems,
                  {MWSCAS} 2022, Fukuoka, Japan, August 7-10, 2022},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/MWSCAS54063.2022.9859327},
  doi          = {10.1109/MWSCAS54063.2022.9859327},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mwscas/DivyanshuKKAM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mwscas/LiuA22,
  author       = {Xingye Liu and
                  Paul Ampadu},
  title        = {A Scalable Integrated {DC/DC} Converter with Enhanced Load Transient
                  Response and Security for Emerging SoC Applications},
  booktitle    = {65th {IEEE} International Midwest Symposium on Circuits and Systems,
                  {MWSCAS} 2022, Fukuoka, Japan, August 7-10, 2022},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/MWSCAS54063.2022.9859336},
  doi          = {10.1109/MWSCAS54063.2022.9859336},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mwscas/LiuA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KassarCCBY22,
  author       = {Feras Al Kassar and
                  Giulia Clerici and
                  Luca Compagna and
                  Davide Balzarotti and
                  Fabian Yamaguchi},
  title        = {Testability Tarpits: the Impact of Code Patterns on the Security Testing
                  of Web Applications},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-206/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/KassarCCBY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/CorinCCMS22,
  author       = {Roberto Doriguzzi Corin and
                  Silvio Cretti and
                  Tiziana Catena and
                  Simone Magnani and
                  Domenico Siracusa},
  editor       = {Alexander Clemm and
                  Guido Maier and
                  Carmen Mas Machuca and
                  K. K. Ramakrishnan and
                  Fulvio Risso and
                  Prosper Chemouil and
                  Noura Limam},
  title        = {Towards Application-Aware Provisioning of Security Services with Kubernetes},
  booktitle    = {8th {IEEE} International Conference on Network Softwarization, NetSoft
                  2022, Milan, Italy, June 27 - July 1, 2022},
  pages        = {284--286},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/NetSoft54395.2022.9844023},
  doi          = {10.1109/NETSOFT54395.2022.9844023},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/netsoft/CorinCCMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/TopmanA22,
  author       = {Nicholas Topman and
                  Asma Adnane},
  title        = {Mobile applications for connected cars: Security analysis and risk
                  assessment},
  booktitle    = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2022, Budapest, Hungary, April 25-29, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/NOMS54207.2022.9789873},
  doi          = {10.1109/NOMS54207.2022.9789873},
  timestamp    = {Wed, 15 Jun 2022 16:45:18 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/TopmanA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pais/KenazaKBML22,
  author       = {Rabah Kenaza and
                  Ameur Khemane and
                  Hakim Bendjenna and
                  Abdallah Meraoumia and
                  Laimeche Lakhdar},
  title        = {Internet of Things (IoT): Architecture, Applications, and Security
                  Challenges},
  booktitle    = {4th International Conference on Pattern Analysis and Intelligent Systems,
                  {PAIS} 2022, Oum El Bouaghi, Algeria, October 12-13, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/PAIS56586.2022.9946918},
  doi          = {10.1109/PAIS56586.2022.9946918},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pais/KenazaKBML22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/profes/IovanC22,
  author       = {Monica Iovan and
                  Daniela Soares Cruzes},
  editor       = {Davide Taibi and
                  Marco Kuhrmann and
                  Tommi Mikkonen and
                  Jil Kl{\"{u}}nder and
                  Pekka Abrahamsson},
  title        = {Data-Driven Improvement of Static Application Security Testing Service:
                  An Experience Report in Visma},
  booktitle    = {Product-Focused Software Process Improvement - 23rd International
                  Conference, {PROFES} 2022, Jyv{\"{a}}skyl{\"{a}}, Finland,
                  November 21-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13709},
  pages        = {157--170},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-21388-5\_11},
  doi          = {10.1007/978-3-031-21388-5\_11},
  timestamp    = {Thu, 17 Nov 2022 16:10:54 +0100},
  biburl       = {https://dblp.org/rec/conf/profes/IovanC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/Kaneko22,
  author       = {Tomoko Kaneko},
  title        = {Security Resilience - Considerations from the Application of the Functional
                  Resonance Method {(FRAM)} to Information Security Incidents},
  booktitle    = {22nd {IEEE} International Conference on Software Quality, Reliability,
                  and Security, {QRS} 2022 - Companion, Guangzhou, China, December 5-9,
                  2022},
  pages        = {16--23},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/QRS-C57518.2022.00013},
  doi          = {10.1109/QRS-C57518.2022.00013},
  timestamp    = {Sat, 22 Apr 2023 17:02:06 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/Kaneko22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ricai/JiangWWYCZ22,
  author       = {Chunlin Jiang and
                  Shi{-}lan Wu and
                  Guangsheng Wu and
                  Chunrong Yang and
                  Lin Cai and
                  Fulian Zhong},
  title        = {Application Research of security policy in the Linux operating system},
  booktitle    = {Proceedings of the 4th International Conference on Robotics, Intelligent
                  Control and Artificial Intelligence, {RICAI} 2022, Dongguan, China,
                  December 16-18, 2022},
  pages        = {638--641},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584376.3584488},
  doi          = {10.1145/3584376.3584488},
  timestamp    = {Fri, 19 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ricai/JiangWWYCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/roedunet/ContaselTP22,
  author       = {Cristian Contasel and
                  Dumitru{-}Cristian Tranca and
                  Alexandru{-}Viorel Palacean},
  title        = {Increasing the security of web applications by using smartphones},
  booktitle    = {21st RoEduNet Conference: Networking in Education and Research, RoEduNet
                  2022, Sovata, Romania, September 15-16, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/RoEduNet57163.2022.9921098},
  doi          = {10.1109/ROEDUNET57163.2022.9921098},
  timestamp    = {Thu, 10 Nov 2022 10:31:43 +0100},
  biburl       = {https://dblp.org/rec/conf/roedunet/ContaselTP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sds/AlsharaSJ22,
  author       = {Zakarea Alshara and
                  Anas Shatnawi and
                  Yaser Jararweh},
  editor       = {Larbi Boubchir and
                  Boubaker Daachi and
                  Abdellah Mokrane and
                  Yaser Jararweh and
                  Elhadj Benkhelifa},
  title        = {NIV-Detector: An Automated Approach for Detecting Next- Intent Security
                  Vulnerability in Android Applications},
  booktitle    = {Ninth International Conference on Software Defined Systems, {SDS}
                  2022, Paris, France, December 12-15, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SDS57574.2022.10062925},
  doi          = {10.1109/SDS57574.2022.10062925},
  timestamp    = {Wed, 29 Mar 2023 17:16:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sds/AlsharaSJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sds/FilhoSBRSC22,
  author       = {Raimir Holanda Filho and
                  Debora Carla Barboza de Sousa and
                  Wellington Alves de Brito and
                  Victor Pasknel de Alencar Ribeiro and
                  Emanuel Le{\~{a}}o S{\'{a}} and
                  Joan Lucas Marques de Sousa Chaves},
  editor       = {Larbi Boubchir and
                  Boubaker Daachi and
                  Abdellah Mokrane and
                  Yaser Jararweh and
                  Elhadj Benkhelifa},
  title        = {Smart Contract Implementation to Improve Security on Solid Waste Management
                  Application},
  booktitle    = {Ninth International Conference on Software Defined Systems, {SDS}
                  2022, Paris, France, December 12-15, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SDS57574.2022.10062932},
  doi          = {10.1109/SDS57574.2022.10062932},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sds/FilhoSBRSC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/PhokelaSDKB22,
  author       = {Kanchanjot Kaur Phokela and
                  Kapil Singi and
                  Kuntal Dey and
                  Vikrant Kaulgud and
                  Adam P. Burden},
  title        = {Framework to Assess Policy Driven Security Misconfiguration Risks
                  in Cloud Native Application},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {63--64},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00023},
  doi          = {10.1109/SECDEV53368.2022.00023},
  timestamp    = {Tue, 20 Dec 2022 15:29:05 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/PhokelaSDKB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/segah/OrjiHSO22,
  author       = {Joseph Orji and
                  Amelia Hernandez and
                  Biebelemabo Selema and
                  Rita Orji},
  title        = {Virtual and Augmented Reality Applications for Promoting Safety and
                  Security: {A} Systematic Review},
  booktitle    = {2022 {IEEE} 10th International Conference on Serious Games and Applications
                  for Health(SeGAH), Sydney, Australia, August 10-12, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SEGAH54908.2022.9978597},
  doi          = {10.1109/SEGAH54908.2022.9978597},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/segah/OrjiHSO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/ChristakisCFLMP22,
  author       = {Maria Christakis and
                  Thomas Cottenier and
                  Antonio Filieri and
                  Linghui Luo and
                  Muhammad Numair Mansur and
                  Lee Pike and
                  Nicol{\'{a}}s Rosner and
                  Martin Sch{\"{a}}f and
                  Aritra Sengupta and
                  Willem Visser},
  editor       = {Abhik Roychoudhury and
                  Cristian Cadar and
                  Miryung Kim},
  title        = {Input splitting for cloud-based static application security testing
                  platforms},
  booktitle    = {Proceedings of the 30th {ACM} Joint European Software Engineering
                  Conference and Symposium on the Foundations of Software Engineering,
                  {ESEC/FSE} 2022, Singapore, Singapore, November 14-18, 2022},
  pages        = {1367--1378},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3540250.3558944},
  doi          = {10.1145/3540250.3558944},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/ChristakisCFLMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sii/ArnarsonKKSP22,
  author       = {Halldor Arnarson and
                  Faraz Safarpour Kanafi and
                  Tero Kaarlela and
                  Ulrich Seldeslachts and
                  Roel Pieters},
  title        = {Evaluation of cyber security in agile manufacturing: Maturity of Technologies
                  and Applications},
  booktitle    = {{IEEE/SICE} International Symposium on System Integration, {SII} 2022,
                  Narvik, Norway, January 9-12, 2022},
  pages        = {784--789},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SII52469.2022.9708888},
  doi          = {10.1109/SII52469.2022.9708888},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sii/ArnarsonKKSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/softcom/KovacevicMGV22,
  author       = {Ivan Kovacevic and
                  Mihael Marovic and
                  Stjepan Gros and
                  Marin Vukovic},
  title        = {Predicting Vulnerabilities in Web Applications Based on Website Security
                  Model},
  booktitle    = {30th International Conference on Software, Telecommunications and
                  Computer Networks, SoftCOM 2022, Split, Croatia, September 22-24,
                  2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://ieeexplore.ieee.org/document/9911436},
  timestamp    = {Tue, 25 Oct 2022 14:27:11 +0200},
  biburl       = {https://dblp.org/rec/conf/softcom/KovacevicMGV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Howes0MS22,
  author       = {James K. Howes IV and
                  Marios Georgiou and
                  Alex J. Malozemoff and
                  Thomas Shrimpton},
  title        = {Security Foundations for Application-Based Covert Communication Channels},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {1971--1986},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833752},
  doi          = {10.1109/SP46214.2022.9833752},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Howes0MS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tdit/MandalK022,
  author       = {Subhadeep Mandal and
                  Arpan Kumar Kar and
                  Shivam Gupta},
  editor       = {Sujeet Kumar Sharma and
                  Yogesh K. Dwivedi and
                  Bhimaraya A. Metri and
                  Banita Lal and
                  Amany R. Elbanna},
  title        = {Blockchain-Based Application Security Versus Centralized and Distributed
                  Data Management Systems - {A} Comparative Study},
  booktitle    = {Transfer, Diffusion and Adoption of Next-Generation Digital Technologies
                  - {IFIP} {WG} 8.6 International Working Conference on Transfer and
                  Diffusion of IT, {TDIT} 2023, Nagpur, India, December 15-16, 2023,
                  Proceedings, Part {I}},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {697},
  pages        = {207--218},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-50188-3\_18},
  doi          = {10.1007/978-3-031-50188-3\_18},
  timestamp    = {Wed, 31 Jan 2024 08:20:28 +0100},
  biburl       = {https://dblp.org/rec/conf/tdit/MandalK022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BertoglioSZL22,
  author       = {Daniel Dalalana Bertoglio and
                  Luis G. B. Sch{\"{u}}ler and
                  Avelino F. Zorzo and
                  Roben Castagna Lunardi},
  title        = {Understanding the Penetration Test Workflow: a security test with
                  Tramonto in an e-Government application},
  booktitle    = {{IEEE} International Conference on Trust, Security and Privacy in
                  Computing and Communications, TrustCom 2022, Wuhan, China, December
                  9-11, 2022},
  pages        = {1597--1604},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00229},
  doi          = {10.1109/TRUSTCOM56396.2022.00229},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BertoglioSZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ubisec/AlshaikhP022,
  author       = {Omar Alshaikh and
                  Simon Parkinson and
                  Saad Khan},
  editor       = {Guojun Wang and
                  Kim{-}Kwang Raymond Choo and
                  Jie Wu and
                  Ernesto Damiani},
  title        = {On the Variability in the Application and Measurement of Supervised
                  Machine Learning in Cyber Security},
  booktitle    = {Ubiquitous Security - Second International Conference, UbiSec 2022,
                  Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1768},
  pages        = {545--555},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-99-0272-9\_38},
  doi          = {10.1007/978-981-99-0272-9\_38},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ubisec/AlshaikhP022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucami/CandelMM22,
  author       = {Jos{\'{e}} Manuel Ortega Candel and
                  Francisco Jos{\'{e}} Mora{-}Gimeno and
                  Higinio Mora Mora},
  editor       = {Jos{\'{e}} Bravo and
                  Sergio F. Ochoa and
                  Jes{\'{u}}s Favela},
  title        = {Serverless Security Analysis for IoT Applications},
  booktitle    = {Proceedings of the International Conference on Ubiquitous Computing
                  {\&} Ambient Intelligence, UCAmI 2022, C{\'{o}}rdoba, Spain,
                  29 November - 2 December 2022},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {594},
  pages        = {393--400},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-21333-5\_39},
  doi          = {10.1007/978-3-031-21333-5\_39},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ucami/CandelMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0004HP022,
  author       = {Daniel G{\"{u}}nther and
                  Maurice Heymann and
                  Benny Pinkas and
                  Thomas Schneider},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {GPU-accelerated {PIR} with Client-Independent Preprocessing for Large-Scale
                  Applications},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {1759--1776},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/gunther},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0004HP022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ArdiAKDHTS22,
  author       = {Calvin Ardi and
                  Connor Aubry and
                  Brian Kocoloski and
                  Dave DeAngelis and
                  Alefiya Hussain and
                  Matthew Troglia and
                  Stephen Schwab},
  title        = {The {DARPA} {SEARCHLIGHT} Dataset of Application Network Traffic},
  booktitle    = {{CSET} 2022: Cyber Security Experimentation and Test Workshop, Virtual
                  Event, 8 August 2022},
  pages        = {59--64},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3546096.3546103},
  doi          = {10.1145/3546096.3546103},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ArdiAKDHTS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BalashWGRA22,
  author       = {David G. Balash and
                  Xiaoyuan Wu and
                  Miles Grant and
                  Irwin Reyes and
                  Adam J. Aviv},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Security and Privacy Perceptions of Third-Party Application Access
                  for Google Accounts},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3397--3414},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/balash},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BalashWGRA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenLXZ00022,
  author       = {Yuan Chen and
                  Jiaqi Li and
                  Guorui Xu and
                  Yajin Zhou and
                  Zhi Wang and
                  Cong Wang and
                  Kui Ren},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {SGXLock: Towards Efficiently Establishing Mutual Distrust Between
                  Host Application and Enclave for {SGX}},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {4129--4146},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/chen-yuan},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChenLXZ00022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Chinprutthiwong22,
  author       = {Phakpoom Chinprutthiwong and
                  Jianwei Huang and
                  Guofei Gu},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {{SWAPP:} {A} New Programmable Playground for Web Application Security},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {2029--2046},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/chinprutthiwong},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Chinprutthiwong22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Harrity0SL22,
  author       = {Michael Harrity and
                  Kevin Bock and
                  Frederick Sell and
                  Dave Levin},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {{GET} /out: Automated Discovery of Application-Layer Censorship Evasion
                  Strategies},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {465--483},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/harrity},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Harrity0SL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LeungG0RZ22,
  author       = {Derek Leung and
                  Yossi Gilad and
                  Sergey Gorbunov and
                  Leonid Reyzin and
                  Nickolai Zeldovich},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Aardvark: An Asynchronous Authenticated Dictionary with Applications
                  to Account-based Cryptocurrencies},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {4237--4254},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/leung},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LeungG0RZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Shi0LMCWZH022,
  author       = {Youkun Shi and
                  Yuan Zhang and
                  Tianhan Luo and
                  Xiangyu Mao and
                  Yinzhi Cao and
                  Ziwen Wang and
                  Yudi Zhao and
                  Zongan Huang and
                  Min Yang},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Backporting Security Patches of Web Applications: {A} Prototype Design
                  and Implementation on Injection Vulnerability Patches},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {1993--2010},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/shi},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Shi0LMCWZH022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YoungL0HD22,
  author       = {Jeffrey Young and
                  Song Liao and
                  Long Cheng and
                  Hongxin Hu and
                  Huixing Deng},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {SkillDetective: Automated Policy-Violation Detection of Voice Assistant
                  Applications in the Wild},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {1113--1130},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/young},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/YoungL0HD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangXHSZ22,
  author       = {Jiaheng Zhang and
                  Tiancheng Xie and
                  Thang Hoang and
                  Elaine Shi and
                  Yupeng Zhang},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Polynomial Commitment with a One-to-Many Prover and Applications},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {2965--2982},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/zhang-jiaheng},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangXHSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/Kumar022,
  author       = {Amritesh Kumar and
                  Debasis Das},
  title        = {IntelligentChain: Blockchain and Machine Learning based Intelligent
                  Security Application for Internet of Vehicles (IoV)},
  booktitle    = {95th {IEEE} Vehicular Technology Conference, {VTC} Spring 2022, Helsinki,
                  Finland, June 19-22, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/VTC2022-Spring54318.2022.9860946},
  doi          = {10.1109/VTC2022-SPRING54318.2022.9860946},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/Kumar022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vts/KibriaFFT22,
  author       = {Rasheed Kibria and
                  Nusrat Farzana and
                  Farimah Farahmandi and
                  Mark M. Tehranipoor},
  title        = {FSMx: Finite State Machine Extraction from Flattened Netlist With
                  Application to Security},
  booktitle    = {40th {IEEE} {VLSI} Test Symposium, {VTS} 2022, San Diego, CA, USA,
                  April 25-27, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/VTS52500.2021.9794151},
  doi          = {10.1109/VTS52500.2021.9794151},
  timestamp    = {Wed, 22 Jun 2022 15:24:48 +0200},
  biburl       = {https://dblp.org/rec/conf/vts/KibriaFFT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wac2/TianJ22,
  author       = {Qiuyan Tian and
                  Huayan Jiang},
  title        = {Application of Big Data Technology in Information Security},
  booktitle    = {World Automation Congress, {WAC} 2022, San Antonio, TX, USA, October
                  11-15, 2022},
  pages        = {133--137},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.23919/WAC55640.2022.9934346},
  doi          = {10.23919/WAC55640.2022.9934346},
  timestamp    = {Fri, 18 Nov 2022 17:35:33 +0100},
  biburl       = {https://dblp.org/rec/conf/wac2/TianJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/HassanshahiLK22,
  author       = {Behnaz Hassanshahi and
                  Hyunjun Lee and
                  Paddy Krishnan},
  title        = {Gelato: Feedback-driven and Guided Security Analysis of Client-side
                  Web Applications},
  booktitle    = {{IEEE} International Conference on Software Analysis, Evolution and
                  Reengineering, {SANER} 2022, Honolulu, HI, USA, March 15-18, 2022},
  pages        = {618--629},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SANER53432.2022.00079},
  doi          = {10.1109/SANER53432.2022.00079},
  timestamp    = {Tue, 26 Jul 2022 14:23:17 +0200},
  biburl       = {https://dblp.org/rec/conf/wcre/HassanshahiLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/PuentesLRHS22,
  author       = {Matthew A. Puentes and
                  Yunsen Lei and
                  No{\"{e}}lle Rakotondravony and
                  Lane T. Harrison and
                  Craig A. Shue},
  title        = {Visualizing Web Application Execution Logs to Improve Software Security
                  Defect Localization},
  booktitle    = {{IEEE} International Conference on Software Analysis, Evolution and
                  Reengineering, {SANER} 2022, Honolulu, HI, USA, March 15-18, 2022},
  pages        = {1183--1190},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SANER53432.2022.00138},
  doi          = {10.1109/SANER53432.2022.00138},
  timestamp    = {Tue, 26 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcre/PuentesLRHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wf-iot/HasanHH22,
  author       = {Raiful Hasan and
                  Mohammad Aminul Hoque and
                  Ragib Hasan},
  title        = {Towards a Threat Model and Security Analysis for Contact Tracing Applications},
  booktitle    = {8th {IEEE} World Forum on Internet of Things, WF-IoT 2022, Yokohama,
                  Japan, October 26 - Nov. 11, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WF-IoT54382.2022.10152080},
  doi          = {10.1109/WF-IOT54382.2022.10152080},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wf-iot/HasanHH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/KishnaniNDD22,
  author       = {Urvashi Kishnani and
                  Naheem Noah and
                  Sanchari Das and
                  Rinku Dewri},
  editor       = {Yuan Hong and
                  Lingyu Wang},
  title        = {Privacy and Security Evaluation of Mobile Payment Applications Through
                  User-Generated Reviews},
  booktitle    = {Proceedings of the 21st Workshop on Privacy in the Electronic Society,
                  WPES2022, Los Angeles, CA, USA, 7 November 2022},
  pages        = {159--173},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3559613.3563196},
  doi          = {10.1145/3559613.3563196},
  timestamp    = {Thu, 03 Nov 2022 11:08:36 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/KishnaniNDD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/RuffinLLW22,
  author       = {Margie Ruffin and
                  Israel Lopez{-}Toledo and
                  Kirill Levchenko and
                  Gang Wang},
  editor       = {Yuan Hong and
                  Lingyu Wang},
  title        = {Casing the Vault: Security Analysis of Vault Applications},
  booktitle    = {Proceedings of the 21st Workshop on Privacy in the Electronic Society,
                  WPES2022, Los Angeles, CA, USA, 7 November 2022},
  pages        = {175--180},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3559613.3563204},
  doi          = {10.1145/3559613.3563204},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/RuffinLLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/22/ArafinXQ22,
  author       = {Md Tanvir Arafin and
                  Qian Xu and
                  Gang Qu},
  editor       = {Weiqiang Liu and
                  Fabrizio Lombardi},
  title        = {Voltage Overscaling Techniques for Security Applications},
  booktitle    = {Approximate Computing},
  pages        = {287--311},
  publisher    = {Springer International Publishing},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98347-5\_12},
  doi          = {10.1007/978-3-030-98347-5\_12},
  timestamp    = {Thu, 23 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/22/ArafinXQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/22/TorkyDH22,
  author       = {Mohamed Torky and
                  Ashraf Darwish and
                  Aboul Ella Hassanien},
  editor       = {Aboul Ella Hassanien and
                  Ashraf Darwish and
                  V{\'{a}}clav Sn{\'{a}}sel},
  title        = {Integrated Digital Twins and Blockchain Framework for Privacy and
                  Security of Applications},
  booktitle    = {Digital Twins for Digital Transformation: Innovation in Industry},
  series       = {Studies in Systems, Decision and Control},
  volume       = {423},
  pages        = {99--112},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-96802-1\_6},
  doi          = {10.1007/978-3-030-96802-1\_6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/22/TorkyDH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2022,
  title        = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625},
  doi          = {10.1145/3564625},
  isbn         = {978-1-4503-9759-9},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2022-1,
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13791},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22963-3},
  doi          = {10.1007/978-3-031-22963-3},
  isbn         = {978-3-031-22962-6},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2022-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2022-2,
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13792},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22966-4},
  doi          = {10.1007/978-3-031-22966-4},
  isbn         = {978-3-031-22965-7},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2022-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2022-3,
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5},
  doi          = {10.1007/978-3-031-22969-5},
  isbn         = {978-3-031-22968-8},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2022-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2022-4,
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13794},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22972-5},
  doi          = {10.1007/978-3-031-22972-5},
  isbn         = {978-3-031-22971-8},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2022-4.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/atis/2021,
  editor       = {Shiva Raj Pokhrel and
                  Min Yu and
                  Gang Li},
  title        = {Applications and Techniques in Information Security - 12th International
                  Conference, {ATIS} 2021, Virtual Event, December 16-17, 2021, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1554},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-19-1166-8},
  doi          = {10.1007/978-981-19-1166-8},
  isbn         = {978-981-19-1165-1},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atis/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2022,
  editor       = {Anupam Joshi and
                  Maribel Fern{\'{a}}ndez and
                  Rakesh M. Verma},
  title        = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security
                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508398},
  doi          = {10.1145/3508398},
  isbn         = {978-1-4503-9220-4},
  timestamp    = {Wed, 20 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2022,
  editor       = {Shamik Sural and
                  Haibing Lu},
  title        = {Data and Applications Security and Privacy {XXXVI} - 36th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13383},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-10684-2},
  doi          = {10.1007/978-3-031-10684-2},
  isbn         = {978-3-031-10683-5},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisa/2021,
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-93956-4},
  doi          = {10.1007/978-3-030-93956-4},
  isbn         = {978-3-030-93955-7},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eisa/2022,
  editor       = {Jiageng Chen and
                  Debiao He and
                  Rongxing Lu},
  title        = {Emerging Information Security and Applications - Third International
                  Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1641},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23098-1},
  doi          = {10.1007/978-3-031-23098-1},
  isbn         = {978-3-031-23097-4},
  timestamp    = {Wed, 08 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdse/2022ccis,
  editor       = {Tran Khanh Dang and
                  Josef K{\"{u}}ng and
                  Tai M. Chung},
  title        = {Future Data and Security Engineering. Big Data, Security and Privacy,
                  Smart City and Industry 4.0 Applications - 9th International Conference,
                  {FDSE} 2022, Ho Chi Minh City, Vietnam, November 23-25, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1688},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-19-8069-5},
  doi          = {10.1007/978-981-19-8069-5},
  isbn         = {978-981-19-8068-8},
  timestamp    = {Tue, 22 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdse/2022ccis.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tpsisa/2022,
  title        = {4th {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems, and Applications, {TPS-ISA} 2022, Atlanta,
                  GA, USA, December 14-17, 2022},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/TPS-ISA56441.2022},
  doi          = {10.1109/TPS-ISA56441.2022},
  isbn         = {978-1-6654-7408-5},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tpsisa/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/FerragFHMJ22,
  author       = {Mohamed Amine Ferrag and
                  Othmane Friha and
                  Djallel Hamouda and
                  Leandros A. Maglaras and
                  Helge Janicke},
  title        = {Edge-IIoTset: {A} New Comprehensive Realistic Cyber Security Dataset
                  of IoT and IIoT Applications: Centralized and Federated Learning},
  publisher    = {{IEEE} DataPort},
  year         = {2022},
  month        = apr,
  howpublished = {\url{https://doi.org/10.21227/mbc1-1h68}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/mbc1-1h68},
  doi          = {10.21227/MBC1-1H68},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/FerragFHMJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/JimenezD22,
  author       = {Francisco Jos{\'{e}} Fern{\'{a}}ndez Jim{\'{e}}nez and
                  Jos{\'{e}} Ramiro Martinez de Dios},
  title        = {Additional material of "A Robot-Sensor Network Security Architecture
                  for Monitoring Applications"},
  publisher    = {{IEEE} DataPort},
  year         = {2022},
  month        = may,
  howpublished = {\url{https://doi.org/10.21227/62fj-8b04}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/62fj-8b04},
  doi          = {10.21227/62FJ-8B04},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/JimenezD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/ThomeSBB22,
  author       = {Julian Thom{\'{e}} and
                  Lwin Khin Shar and
                  Domenico Bianculli and
                  Lionel C. Briand},
  title        = {Benchmark suite for "An Integrated Approach for Effective Injection
                  Vulnerability Analysis of Web Applications through Security Slicing
                  and Hybrid Constraint Solving"},
  publisher    = {{IEEE} DataPort},
  year         = {2022},
  month        = may,
  howpublished = {\url{https://doi.org/10.21227/H2ZQ1N}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/H2ZQ1N},
  doi          = {10.21227/H2ZQ1N},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/ThomeSBB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-01927,
  author       = {Mahmoud S. Fayed},
  title        = {Network Generations and the Security Challenge in IoT Applications},
  journal      = {CoRR},
  volume       = {abs/2201.01927},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.01927},
  eprinttype    = {arXiv},
  eprint       = {2201.01927},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-01927.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-02351,
  author       = {Hampei Sasahara and
                  Henrik Sandberg},
  title        = {Asymptotic Security using Bayesian Defense Mechanisms with Application
                  to Cyber Deception},
  journal      = {CoRR},
  volume       = {abs/2201.02351},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.02351},
  eprinttype    = {arXiv},
  eprint       = {2201.02351},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-02351.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-03052,
  author       = {Richard Apaua and
                  Harjinder Singh Lallie},
  title        = {Measuring User Perceived Security of Mobile Banking Applications},
  journal      = {CoRR},
  volume       = {abs/2201.03052},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.03052},
  eprinttype    = {arXiv},
  eprint       = {2201.03052},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-03052.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-07417,
  author       = {Nan Sun and
                  Chang{-}Tsun Li and
                  Hin Chan and
                  Ba Dung Le and
                  Md Zahidul Islam and
                  Leo Yu Zhang and
                  Md. Rafiqul Islam and
                  Warren Armstrong},
  title        = {Defining Security Requirements with the Common Criteria: Applications,
                  Adoptions, and Challenges},
  journal      = {CoRR},
  volume       = {abs/2201.07417},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.07417},
  eprinttype    = {arXiv},
  eprint       = {2201.07417},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-07417.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-07496,
  author       = {Utsav Banerjee and
                  Anantha P. Chandrakasan},
  title        = {A Low-Power {BLS12-381} Pairing Crypto-Processor for Internet-of-Things
                  Security Applications},
  journal      = {CoRR},
  volume       = {abs/2201.07496},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.07496},
  eprinttype    = {arXiv},
  eprint       = {2201.07496},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-07496.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-00582,
  author       = {Shaymaa Abdulla Al{-}Delayel},
  title        = {Security Analysis of Mobile Banking Application in Qatar},
  journal      = {CoRR},
  volume       = {abs/2202.00582},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.00582},
  eprinttype    = {arXiv},
  eprint       = {2202.00582},
  timestamp    = {Wed, 09 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-00582.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-01612,
  author       = {Priyanka Billawa and
                  Anusha Bambhore Tukaram and
                  Nicol{\'{a}}s E. D{\'{\i}}az Ferreyra and
                  Jan{-}Philipp Stegh{\"{o}}fer and
                  Riccardo Scandariato and
                  Georg Simhandl},
  title        = {Security of Microservice Applications: {A} Practitioners' Perspective
                  on Challenges and Best Practices},
  journal      = {CoRR},
  volume       = {abs/2202.01612},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.01612},
  eprinttype    = {arXiv},
  eprint       = {2202.01612},
  timestamp    = {Wed, 09 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-01612.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-12693,
  author       = {Marcos Fa{\'{u}}ndez{-}Zanuy and
                  Jir{\'{\i}} Mekyska and
                  Donato Impedovo},
  title        = {Online handwriting, signature and touch dynamics: tasks and potential
                  applications in the field of security and health},
  journal      = {CoRR},
  volume       = {abs/2202.12693},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.12693},
  eprinttype    = {arXiv},
  eprint       = {2202.12693},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-12693.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-12760,
  author       = {Marcos Fa{\'{u}}ndez{-}Zanuy and
                  Julian Fi{\'{e}}rrez and
                  Miguel A. Ferrer and
                  Mois{\'{e}}s D{\'{\i}}az and
                  Ruben Tolosana and
                  R{\'{e}}jean Plamondon},
  title        = {Handwriting Biometrics: Applications and Future Trends in e-Security
                  and e-Health},
  journal      = {CoRR},
  volume       = {abs/2202.12760},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.12760},
  eprinttype    = {arXiv},
  eprint       = {2202.12760},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-12760.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-09325,
  author       = {Nitesh Kumar and
                  Gaurav S. Kasbekar and
                  D. Manjunath},
  title        = {Application of Data Collected by Endpoint Detection and Response Systems
                  for Implementation of a Network Security System based on Zero Trust
                  Principles and the EigenTrust Algorithm},
  journal      = {CoRR},
  volume       = {abs/2203.09325},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.09325},
  doi          = {10.48550/ARXIV.2203.09325},
  eprinttype    = {arXiv},
  eprint       = {2203.09325},
  timestamp    = {Mon, 28 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-09325.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-17215,
  author       = {Jingyi Wang and
                  Cosmin G. Petra},
  title        = {A simplified nonsmooth nonconvex bundle method with applications to
                  security-constrained {ACOPF} problems},
  journal      = {CoRR},
  volume       = {abs/2203.17215},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.17215},
  doi          = {10.48550/ARXIV.2203.17215},
  eprinttype    = {arXiv},
  eprint       = {2203.17215},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-17215.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-04769,
  author       = {Kai Liu and
                  Fei Wang and
                  Zhaoyun Ding and
                  Sheng Liang and
                  Zhengfei Yu and
                  Yun Zhou},
  title        = {A review of knowledge graph application scenarios in cyber security},
  journal      = {CoRR},
  volume       = {abs/2204.04769},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.04769},
  doi          = {10.48550/ARXIV.2204.04769},
  eprinttype    = {arXiv},
  eprint       = {2204.04769},
  timestamp    = {Wed, 13 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-04769.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-07107,
  author       = {Dr. C. Amuthadevi and
                  Sparsh Srivastava and
                  Raghav Khatoria and
                  Varun Sangwan},
  title        = {A Study on Web Application Vulnerabilities to find an optimal Security
                  Architecture},
  journal      = {CoRR},
  volume       = {abs/2204.07107},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.07107},
  doi          = {10.48550/ARXIV.2204.07107},
  eprinttype    = {arXiv},
  eprint       = {2204.07107},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-07107.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-03746,
  author       = {Mattia Paccamiccio and
                  Leonardo Mostarda},
  title        = {Reasoning about inter-procedural security requirements in IoT applications},
  journal      = {CoRR},
  volume       = {abs/2205.03746},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.03746},
  doi          = {10.48550/ARXIV.2205.03746},
  eprinttype    = {arXiv},
  eprint       = {2205.03746},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-03746.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-00868,
  author       = {Muhammad Sajjad Akbar and
                  Zawar Hussain and
                  Quan Z. Sheng and
                  Subhas Mukhopadhyay},
  title        = {6G Survey on Challenges, Requirements, Applications, Key Enabling
                  Technologies, Use Cases, {AI} integration issues and Security aspects},
  journal      = {CoRR},
  volume       = {abs/2206.00868},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.00868},
  doi          = {10.48550/ARXIV.2206.00868},
  eprinttype    = {arXiv},
  eprint       = {2206.00868},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-00868.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-01041,
  author       = {Gianluca Scopelliti and
                  Sepideh Pouyanrad and
                  Job Noorman and
                  Fritz Alder and
                  Christoph Baumann and
                  Frank Piessens and
                  Jan Tobias M{\"{u}}hlberg},
  title        = {End-to-End Security for Distributed Event-Driven Enclave Applications
                  on Heterogeneous TEEs},
  journal      = {CoRR},
  volume       = {abs/2206.01041},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.01041},
  doi          = {10.48550/ARXIV.2206.01041},
  eprinttype    = {arXiv},
  eprint       = {2206.01041},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-01041.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-03930,
  author       = {Sarah Turner and
                  Nandita Pattnaik and
                  Jason R. C. Nurse and
                  Shujun Li},
  title        = {"You Just Assume It Is In There, {I} Guess": {UK} Families' Application
                  And Knowledge Of Smart Home Cyber Security},
  journal      = {CoRR},
  volume       = {abs/2206.03930},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.03930},
  doi          = {10.48550/ARXIV.2206.03930},
  eprinttype    = {arXiv},
  eprint       = {2206.03930},
  timestamp    = {Tue, 14 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-03930.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-14304,
  author       = {Shilun Li and
                  Zijing Di},
  title        = {Indistinguishability Obfuscation of Circuits and its Application in
                  Security},
  journal      = {CoRR},
  volume       = {abs/2206.14304},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.14304},
  doi          = {10.48550/ARXIV.2206.14304},
  eprinttype    = {arXiv},
  eprint       = {2206.14304},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-14304.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-03209,
  author       = {Sebastian Stock and
                  Atif Mashkoor and
                  Alexander Egyed},
  title        = {Application of Validation Obligations to Security Concerns},
  journal      = {CoRR},
  volume       = {abs/2207.03209},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.03209},
  doi          = {10.48550/ARXIV.2207.03209},
  eprinttype    = {arXiv},
  eprint       = {2207.03209},
  timestamp    = {Fri, 16 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-03209.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-10809,
  author       = {Hans Dermot Doran},
  title        = {Security and Safety Aspects of {AI} in Industry Applications},
  journal      = {CoRR},
  volume       = {abs/2207.10809},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.10809},
  doi          = {10.48550/ARXIV.2207.10809},
  eprinttype    = {arXiv},
  eprint       = {2207.10809},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-10809.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-10605,
  author       = {Azqa Nadeem and
                  Dani{\"{e}}l Vos and
                  Clinton Cao and
                  Luca Pajola and
                  Simon Dieck and
                  Robert Baumgartner and
                  Sicco Verwer},
  title        = {SoK: Explainable Machine Learning for Computer Security Applications},
  journal      = {CoRR},
  volume       = {abs/2208.10605},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.10605},
  doi          = {10.48550/ARXIV.2208.10605},
  eprinttype    = {arXiv},
  eprint       = {2208.10605},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-10605.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-14937,
  author       = {Zhibo Zhang and
                  Hussam M. N. Al Hamadi and
                  Ernesto Damiani and
                  Chan Yeob Yeun and
                  Fatma Taher},
  title        = {Explainable Artificial Intelligence Applications in Cyber Security:
                  State-of-the-Art in Research},
  journal      = {CoRR},
  volume       = {abs/2208.14937},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.14937},
  doi          = {10.48550/ARXIV.2208.14937},
  eprinttype    = {arXiv},
  eprint       = {2208.14937},
  timestamp    = {Thu, 01 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-14937.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-01129,
  author       = {Lesly{-}Ann Daniel and
                  S{\'{e}}bastien Bardin and
                  Tamara Rezk},
  title        = {Binsec/Rel: Symbolic Binary Analyzer for Security with Applications
                  to Constant-Time and Secret-Erasure},
  journal      = {CoRR},
  volume       = {abs/2209.01129},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.01129},
  doi          = {10.48550/ARXIV.2209.01129},
  eprinttype    = {arXiv},
  eprint       = {2209.01129},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-01129.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-03670,
  author       = {Rajendra Kumar Sharma and
                  Ritumoni Sarma and
                  Neha Arora and
                  Vidya Sagar},
  title        = {Multisecret-sharing scheme with two-level security and its applications
                  in Blockchain},
  journal      = {CoRR},
  volume       = {abs/2209.03670},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.03670},
  doi          = {10.48550/ARXIV.2209.03670},
  eprinttype    = {arXiv},
  eprint       = {2209.03670},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-03670.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-03465,
  author       = {Sahitya Yarragolla and
                  Nan Du and
                  Torben Hemke and
                  Xianyue Zhao and
                  Ziang Chen and
                  Ilia Polian and
                  Thomas Mussenbrock},
  title        = {Physics inspired compact modelling of BiFeO{\textdollar}{\_}3{\textdollar}
                  based memristors for hardware security applications},
  journal      = {CoRR},
  volume       = {abs/2210.03465},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.03465},
  doi          = {10.48550/ARXIV.2210.03465},
  eprinttype    = {arXiv},
  eprint       = {2210.03465},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-03465.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-07990,
  author       = {Jiayi Sun and
                  Wensheng Gan and
                  Han{-}Chieh Chao and
                  Philip S. Yu},
  title        = {Metaverse: Survey, Applications, Security, and Opportunities},
  journal      = {CoRR},
  volume       = {abs/2210.07990},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.07990},
  doi          = {10.48550/ARXIV.2210.07990},
  eprinttype    = {arXiv},
  eprint       = {2210.07990},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-07990.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-13547,
  author       = {Subrato Bharati and
                  Prajoy Podder},
  title        = {Machine and Deep Learning for IoT Security and Privacy: Applications,
                  Challenges, and Future Directions},
  journal      = {CoRR},
  volume       = {abs/2210.13547},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.13547},
  doi          = {10.48550/ARXIV.2210.13547},
  eprinttype    = {arXiv},
  eprint       = {2210.13547},
  timestamp    = {Fri, 28 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-13547.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-05565,
  author       = {Mehdi Rafiei and
                  Jenni Raitoharju and
                  Alexandros Iosifidis},
  title        = {Computer Vision on X-ray Data in Industrial Production and Security
                  Applications: {A} survey},
  journal      = {CoRR},
  volume       = {abs/2211.05565},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.05565},
  doi          = {10.48550/ARXIV.2211.05565},
  eprinttype    = {arXiv},
  eprint       = {2211.05565},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-05565.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-06953,
  author       = {Roshan Namal Rajapakse and
                  Mansooreh Zahedi and
                  Muhammad Ali Babar},
  title        = {Collaborative Application Security Testing for DevSecOps: An Empirical
                  Analysis of Challenges, Best Practices and Tool Support},
  journal      = {CoRR},
  volume       = {abs/2211.06953},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.06953},
  doi          = {10.48550/ARXIV.2211.06953},
  eprinttype    = {arXiv},
  eprint       = {2211.06953},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-06953.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-10603,
  author       = {Khaled Sarieddine and
                  Mohammad Ali Sayed and
                  Sadegh Torabi and
                  Ribal Atallah and
                  Chadi Assi},
  title        = {Investigating the Security of {EV} Charging Mobile Applications As
                  an Attack Surface},
  journal      = {CoRR},
  volume       = {abs/2211.10603},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.10603},
  doi          = {10.48550/ARXIV.2211.10603},
  eprinttype    = {arXiv},
  eprint       = {2211.10603},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-10603.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-14115,
  author       = {Tomasz Piotrowski and
                  Matthias Frey and
                  Renato L. G. Cavalcante and
                  Rafail Ismayilov},
  title        = {Inverse Solvability and Security with Applications to Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2211.14115},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.14115},
  doi          = {10.48550/ARXIV.2211.14115},
  eprinttype    = {arXiv},
  eprint       = {2211.14115},
  timestamp    = {Wed, 30 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-14115.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-15013,
  author       = {Anichur Rahman and
                  Md. Jahidul Islam and
                  Rafiqul Islam and
                  Ayesha Aziz and
                  Dipanjali Kundu and
                  Sadia Sazzad and
                  Md. Razaul Karim and
                  Mahedi Hasan and
                  Ziaur Rahman and
                  Said Elnaffar and
                  Shahab S. Band},
  title        = {Enhancing Data Security for Cloud Computing Applications through Distributed
                  Blockchain-based {SDN} Architecture in IoT Networks},
  journal      = {CoRR},
  volume       = {abs/2211.15013},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.15013},
  doi          = {10.48550/ARXIV.2211.15013},
  eprinttype    = {arXiv},
  eprint       = {2211.15013},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-15013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-00756,
  author       = {Ioannis Vasileios Chremos and
                  Andreas A. Malikopoulos},
  title        = {Mechanism Design Theory in Control Engineering: {A} Tutorial and Overview
                  of Applications in Communication, Power Grid, Transportation, and
                  Security Systems},
  journal      = {CoRR},
  volume       = {abs/2212.00756},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.00756},
  doi          = {10.48550/ARXIV.2212.00756},
  eprinttype    = {arXiv},
  eprint       = {2212.00756},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-00756.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-01905,
  author       = {Maliheh Shirvanian and
                  Sebastian Meiser},
  title        = {"Tell me, how do you know it's me?" Expectations of security and personalization
                  measures for smart speaker applications},
  journal      = {CoRR},
  volume       = {abs/2212.01905},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.01905},
  doi          = {10.48550/ARXIV.2212.01905},
  eprinttype    = {arXiv},
  eprint       = {2212.01905},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-01905.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-06123,
  author       = {Ambra Demontis and
                  Maura Pintor and
                  Luca Demetrio and
                  Kathrin Grosse and
                  Hsiao{-}Ying Lin and
                  Chengfang Fang and
                  Battista Biggio and
                  Fabio Roli},
  title        = {A Survey on Reinforcement Learning Security with Application to Autonomous
                  Driving},
  journal      = {CoRR},
  volume       = {abs/2212.06123},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.06123},
  doi          = {10.48550/ARXIV.2212.06123},
  eprinttype    = {arXiv},
  eprint       = {2212.06123},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-06123.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-13993,
  author       = {Mansoor Ali and
                  Faisal Naeem and
                  Georges Kaddoum and
                  Ekram Hossain},
  title        = {Metaverse Communications, Networking, Security, and Applications:
                  Research Issues, State-of-the-Art, and Future Directions},
  journal      = {CoRR},
  volume       = {abs/2212.13993},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.13993},
  doi          = {10.48550/ARXIV.2212.13993},
  eprinttype    = {arXiv},
  eprint       = {2212.13993},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-13993.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlagicBKMS22,
  author       = {Gorjan Alagic and
                  Chen Bai and
                  Jonathan Katz and
                  Christian Majenz and
                  Patrick Struck},
  title        = {Post-Quantum Security of Tweakable Even-Mansour, and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1097},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1097},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlagicBKMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndriesMCS22,
  author       = {Stefania Andries and
                  Andrei{-}Daniel Miron and
                  Andrei Cristian and
                  Emil Simion},
  title        = {A survey on the security protocols employed by mobile messaging applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/088},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AndriesMCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaiLW22,
  author       = {Qiqi Lai and
                  Feng{-}Hao Liu and
                  Zhedong Wang},
  title        = {New Lattice Two-Stage Sampling Technique and its Applications to Functional
                  Encryption - Stronger Security and Smaller Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {779},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/779},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaiLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KibriaRFT22,
  title        = {RTL-FSMx: Fast and Accurate Finite State Machine Extraction at the
                  {RTL} for Security Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1462},
  year         = {2022},
  note         = {Withdrawn.},
  url          = {https://eprint.iacr.org/2022/1462},
  timestamp    = {Sat, 01 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KibriaRFT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsae/Li22a,
  title        = {Application of Artificial Intelligence Technology in Computer Network
                  Security Communication},
  journal      = {J. Control. Sci. Eng.},
  volume       = {2022},
  pages        = {1--6},
  year         = {2022},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1155/2022/9785880},
  doi          = {10.1155/2022/9785880},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocsae/Li22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/WuL22,
  title        = {Application of Symmetric Encryption Algorithm Sensor in the Research
                  of College Student Security Management System},
  journal      = {J. Sensors},
  volume       = {2022},
  pages        = {1--7},
  year         = {2022},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1155/2022/3323547},
  doi          = {10.1155/2022/3323547},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/js/WuL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/hal/Dragos21,
  author       = {Valentina Dragos},
  title        = {Semantic Frameworks to Enhance Situation Awareness for Defence and
                  Security Applications. (D{\'{e}}finition de cadres s{\'{e}}mantiques
                  pour les applications de d{\'{e}}fense et s{\'{e}}curit{\'{e}})},
  year         = {2021},
  url          = {https://tel.archives-ouvertes.fr/tel-03347626},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/hal/Dragos21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Azouaoui21,
  author       = {Melissa Azouaoui},
  title        = {Shortcut side-channel security evaluations: application to elliptic
                  curve cryptography, masking and shuffling},
  school       = {Catholic University of Louvain, Louvain-la-Neuve, Belgium},
  year         = {2021},
  url          = {https://hdl.handle.net/2078.1/254418},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Azouaoui21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Gradolewski21,
  author       = {Dawid Gradolewski},
  title        = {Sensors and Algorithms in Industry 4.0: Security and Health Preservation
                  Applications},
  school       = {Blekinge Institute of Technology, Karlskrona, Sweden},
  year         = {2021},
  url          = {https://nbn-resolving.org/urn:nbn:se:bth-21387},
  urn          = {urn:nbn:se:bth-21387},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Gradolewski21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Huang21b,
  author       = {Jie Huang},
  title        = {Mitigating security and privacy threats from untrusted application
                  components on Android},
  school       = {Saarland University, Saarbr{\"{u}}cken, Germany},
  year         = {2021},
  url          = {https://publikationen.sulb.uni-saarland.de/handle/20.500.11880/34645},
  urn          = {urn:nbn:de:bsz:291--ds-382920},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/dnb/Huang21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Passino21,
  author       = {Francesco Sanna Passino},
  title        = {Latent factor representations of dynamic networks with applications
                  in cyber-security},
  school       = {Imperial College London, {UK}},
  year         = {2021},
  url          = {https://doi.org/10.25560/87691},
  doi          = {10.25560/87691},
  timestamp    = {Mon, 22 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Passino21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Badier21,
  author       = {Hannah Badier},
  title        = {Transient obfuscation for {HLS} security: application to cloud security,
                  birthmarking and hardware Trojan defense. (Offuscation transitoire
                  pour la s{\'{e}}curit{\'{e}} {HLS:} application {\`{a}}
                  la s{\'{e}}curit{\'{e}} du cloud, aux filigranes num{\'{e}}riques
                  et {\`{a}} la d{\'{e}}fense contre les virus type chevaux de
                  Troie)},
  school       = {{\'{E}}cole nationale sup{\'{e}}rieure de techniques avanc{\'{e}}es
                  Bretagne, Brest, France},
  year         = {2021},
  url          = {https://tel.archives-ouvertes.fr/tel-03789700},
  timestamp    = {Wed, 12 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Badier21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Chen21,
  author       = {Huiqin Chen},
  title        = {Registration of egocentric views for collaborative localization in
                  security applications. (Alignement de vues pour la localisation collaborative
                  dans des applications de s{\'{e}}curit{\'{e}})},
  school       = {University of Paris-Saclay, France},
  year         = {2021},
  url          = {https://tel.archives-ouvertes.fr/tel-03259644},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Chen21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Cherif21,
  author       = {Amina Cherif},
  title        = {S{\'{e}}curit{\'{e}} des RFIDs actifs et applications. (Security
                  of active {RFID} and applications)},
  school       = {University of Limoges, France},
  year         = {2021},
  url          = {https://tel.archives-ouvertes.fr/tel-03191329},
  timestamp    = {Wed, 28 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Cherif21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Tayachi21a,
  author       = {Mayssa Tayachi},
  title        = {S{\'{e}}curit{\'{e}} des images par tatouage num{\'{e}}rique
                  et cryptographie dans les applications m{\'{e}}dicales. (Image
                  security by digital watermarking and cryptography for medical applications)},
  school       = {Tunis El Manar University, Tunisia},
  year         = {2021},
  url          = {https://tel.archives-ouvertes.fr/tel-03659821},
  timestamp    = {Fri, 27 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Tayachi21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/se/Mahfouzi21,
  author       = {Rouhollah Mahfouzi},
  title        = {Security-Aware Design of Cyber-Physical Systems for Control Applications},
  school       = {Link{\"{o}}ping University, Sweden},
  year         = {2021},
  url          = {https://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178320},
  urn          = {urn:nbn:se:liu:diva-178320},
  timestamp    = {Thu, 01 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/se/Mahfouzi21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AminEAGM21,
  author       = {Mahmoud Amin and
                  Fayez F. M. El{-}Sousy and
                  Ghada A. Abdel Aziz and
                  Khaled Gaber and
                  Osama A. Mohammed},
  title        = {{CPS} Attacks Mitigation Approaches on Power Electronic Systems With
                  Security Challenges for Smart Grid Applications: {A} Review},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {38571--38601},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3063229},
  doi          = {10.1109/ACCESS.2021.3063229},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AminEAGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/FerragFMJS21,
  author       = {Mohamed Amine Ferrag and
                  Othmane Friha and
                  Leandros A. Maglaras and
                  Helge Janicke and
                  Lei Shu},
  title        = {Federated Deep Learning for Cyber Security in the Internet of Things:
                  Concepts, Applications, and Experimental Analysis},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {138509--138542},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3118642},
  doi          = {10.1109/ACCESS.2021.3118642},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/FerragFMJS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HasanISKHHIAAKH21,
  author       = {Mohammad Kamrul Hasan and
                  Shayla Islam and
                  Rossilawati Sulaiman and
                  Sheroz Khan and
                  Aisha Hassan Abdalla Hashim and
                  Shabana Habib and
                  Muhammad Islam and
                  Saleh Alyahya and
                  Musse Mohamed Ahmed and
                  Samar Kamil and
                  Md Arif Hassan},
  title        = {Lightweight Encryption Technique to Enhance Medical Image Security
                  on Internet of Medical Things Applications},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {47731--47742},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3061710},
  doi          = {10.1109/ACCESS.2021.3061710},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HasanISKHHIAAKH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HeZ21,
  author       = {Ningyu He and
                  Jie Zhu},
  title        = {A Weighted Partial Domain Adaptation for Acoustic Scene Classification
                  and Its Application in Fiber Optic Security System},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {2244--2250},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2020.3044153},
  doi          = {10.1109/ACCESS.2020.3044153},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HeZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KaracanS21,
  author       = {Hacer Karacan and
                  Mehmet Sevri},
  title        = {A Novel Data Augmentation Technique and Deep Learning Model for Web
                  Application Security},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {150781--150797},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3125785},
  doi          = {10.1109/ACCESS.2021.3125785},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KaracanS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KimCBJK21,
  author       = {Hyo{-}Young Kim and
                  Sung{-}Jin Cho and
                  Seung{-}Jin Baek and
                  Seung{-}Won Jung and
                  Sung{-}Jea Ko},
  title        = {Learning-Based Image Synthesis for Hazardous Object Detection in X-Ray
                  Security Applications},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {135256--135265},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3116255},
  doi          = {10.1109/ACCESS.2021.3116255},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KimCBJK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MishraP21,
  author       = {Nivedita Mishra and
                  Sharnil Pandya},
  title        = {Internet of Things Applications, Security Challenges, Attacks, Intrusion
                  Detection, and Future Visions: {A} Systematic Review},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {59353--59377},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3073408},
  doi          = {10.1109/ACCESS.2021.3073408},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MishraP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MofidMMF21,
  author       = {Omid Mofid and
                  Mahdi Momeni and
                  Saleh Mobayen and
                  Afef Fekih},
  title        = {A Disturbance-Observer-Based Sliding Mode Control for the Robust Synchronization
                  of Uncertain Delayed Chaotic Systems: Application to Data Security},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {16546--16555},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3053014},
  doi          = {10.1109/ACCESS.2021.3053014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MofidMMF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Morales-Sandoval21,
  author       = {Miguel Morales{-}Sandoval and
                  Ricardo De{-}La{-}Parra{-}Aguirre and
                  Hiram Galeana{-}Zapi{\'{e}}n and
                  Alejandro Galaviz{-}Mosqueda},
  title        = {A Three-Tier Approach for Lightweight Data Security of Body Area Networks
                  in E-Health Applications},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {146350--146365},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3123456},
  doi          = {10.1109/ACCESS.2021.3123456},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/Morales-Sandoval21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SonmezK21,
  author       = {Ferda {\"{O}}zdemir S{\"{o}}nmez and
                  Banu G{\"{u}}nel Kili{\c{c}}},
  title        = {Holistic Web Application Security Visualization for Multi-Project
                  and Multi-Phase Dynamic Application Security Test Results},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {25858--25884},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3057044},
  doi          = {10.1109/ACCESS.2021.3057044},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SonmezK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SonmezK21a,
  author       = {Ferda {\"{O}}zdemir S{\"{o}}nmez and
                  Banu G{\"{u}}nel Kili{\c{c}}},
  title        = {Reusable Security Requirements Repository Implementation Based on
                  Application/System Components},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {165966--165988},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3133020},
  doi          = {10.1109/ACCESS.2021.3133020},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/SonmezK21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZahidTAAHMF21,
  author       = {Amjad Hussain Zahid and
                  Lo'ai Tawalbeh and
                  Musheer Ahmad and
                  Ahmed Alkhayyat and
                  Malik Tahir Hassan and
                  Atif Manzoor and
                  Alaa Kadhim Farhan},
  title        = {Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation
                  for Security Applications},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {98460--98475},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3095618},
  doi          = {10.1109/ACCESS.2021.3095618},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZahidTAAHMF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/accs/KassenovMT21,
  author       = {Adil A. Kassenov and
                  Alexey Anatolievich Magazev and
                  Valeria Fedorovna Tsyrulnik},
  title        = {Markov Model of Nonmutually Exclusive Cyberthreats and Its Applications
                  for Selecting an Optimal Set of Information Security Tools},
  journal      = {Autom. Control. Comput. Sci.},
  volume       = {55},
  number       = {7},
  pages        = {623--635},
  year         = {2021},
  url          = {https://doi.org/10.3103/S0146411621070075},
  doi          = {10.3103/S0146411621070075},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/accs/KassenovMT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aisy/LvLG21,
  author       = {Shiya Lv and
                  Jian Liu and
                  Zhaoxin Geng},
  title        = {Application of Memristors in Hardware Security: {A} Current State-of-the-Art
                  Technology},
  journal      = {Adv. Intell. Syst.},
  volume       = {3},
  number       = {1},
  pages        = {2000127},
  year         = {2021},
  url          = {https://doi.org/10.1002/aisy.202000127},
  doi          = {10.1002/AISY.202000127},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aisy/LvLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithms/StodtSRGWS21,
  author       = {Jan Stodt and
                  Daniel Sch{\"{o}}nle and
                  Christoph Reich and
                  Fatemeh Ghovanlooy Ghajar and
                  Dominik Welte and
                  Axel Sikora},
  title        = {Security Audit of a Blockchain-Based Industrial Application Platform},
  journal      = {Algorithms},
  volume       = {14},
  number       = {4},
  pages        = {121},
  year         = {2021},
  url          = {https://doi.org/10.3390/a14040121},
  doi          = {10.3390/A14040121},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithms/StodtSRGWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/behaviourIT/ChassidimPTL21,
  author       = {Hadas Chassidim and
                  Christos Perentis and
                  Eran Toch and
                  Bruno Lepri},
  title        = {Between privacy and security: the factors that drive intentions to
                  use cyber-security applications},
  journal      = {Behav. Inf. Technol.},
  volume       = {40},
  number       = {16},
  pages        = {1769--1783},
  year         = {2021},
  url          = {https://doi.org/10.1080/0144929x.2020.1781259},
  doi          = {10.1080/0144929X.2020.1781259},
  timestamp    = {Thu, 10 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/behaviourIT/ChassidimPTL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/AledhariRP21,
  author       = {Mohammed Aledhari and
                  Rehma Razzak and
                  Reza M. Parizi},
  title        = {Machine learning for network application security: Empirical evaluation
                  and optimization},
  journal      = {Comput. Electr. Eng.},
  volume       = {91},
  pages        = {107052},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.compeleceng.2021.107052},
  doi          = {10.1016/J.COMPELECENG.2021.107052},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/AledhariRP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/BaldiniGGD21,
  author       = {Gianmarco Baldini and
                  Raimondo Giuliani and
                  Monica Gemo and
                  Franc Dimc},
  title        = {On the application of sensor authentication with intrinsic physical
                  features to vehicle security},
  journal      = {Comput. Electr. Eng.},
  volume       = {91},
  pages        = {107053},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.compeleceng.2021.107053},
  doi          = {10.1016/J.COMPELECENG.2021.107053},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/BaldiniGGD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/BhushanSSJ21,
  author       = {Bharat Bhushan and
                  Preeti Sinha and
                  Kulandairaj Martin Sagayam and
                  J. Andrew Onesimu},
  title        = {Untangling blockchain technology: {A} survey on state of the art,
                  security threats, privacy services, applications and future research
                  directions},
  journal      = {Comput. Electr. Eng.},
  volume       = {90},
  pages        = {106897},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.compeleceng.2020.106897},
  doi          = {10.1016/J.COMPELECENG.2020.106897},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/BhushanSSJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/Cabal-YepezLBA21,
  author       = {Eduardo Cabal{-}Yepez and
                  Luis Manuel Ledesma{-}Carrillo and
                  Guillermo Botella and
                  Irene Amerini},
  title        = {Introduction to the special section on image processing in security
                  applications (VSI-ipsa)},
  journal      = {Comput. Electr. Eng.},
  volume       = {89},
  pages        = {106935},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.compeleceng.2020.106935},
  doi          = {10.1016/J.COMPELECENG.2020.106935},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/Cabal-YepezLBA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/ChooDK21,
  author       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Hadis Karimipour},
  title        = {Introduction to the special section on application of artificial intelligence
                  in security of cyber physical systems (VSI-aicps)},
  journal      = {Comput. Electr. Eng.},
  volume       = {92},
  pages        = {107145},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.compeleceng.2021.107145},
  doi          = {10.1016/J.COMPELECENG.2021.107145},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/ChooDK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BrotsisLBKS21,
  author       = {Sotirios Brotsis and
                  Konstantinos Limniotis and
                  Gueltoum Bendiab and
                  Nicholas Kolokotronis and
                  Stavros Shiaeles},
  title        = {On the suitability of blockchain platforms for IoT applications: Architectures,
                  security, privacy, and performance},
  journal      = {Comput. Networks},
  volume       = {191},
  pages        = {108005},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108005},
  doi          = {10.1016/J.COMNET.2021.108005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/BrotsisLBKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cogcom/Faundez-ZanuyMI21,
  author       = {Marcos Fa{\'{u}}ndez{-}Zanuy and
                  Jir{\'{\i}} Mekyska and
                  Donato Impedovo},
  title        = {Online Handwriting, Signature and Touch Dynamics: Tasks and Potential
                  Applications in the Field of Security and Health},
  journal      = {Cogn. Comput.},
  volume       = {13},
  number       = {5},
  pages        = {1406--1421},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12559-021-09938-2},
  doi          = {10.1007/S12559-021-09938-2},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cogcom/Faundez-ZanuyMI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computation/Munoz-AusechaRR21,
  author       = {Cesar Munoz{-}Ausecha and
                  Juan Ruiz{-}Rosero and
                  Gustavo{-}Adolfo Ram{\'{\i}}rez{-}Gonz{\'{a}}lez},
  title        = {{RFID} Applications and Security Review},
  journal      = {Comput.},
  volume       = {9},
  number       = {6},
  pages        = {69},
  year         = {2021},
  url          = {https://doi.org/10.3390/computation9060069},
  doi          = {10.3390/COMPUTATION9060069},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computation/Munoz-AusechaRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ChernyshevBZ21,
  author       = {Maxim Chernyshev and
                  Zubair Ahmed Baig and
                  Sherali Zeadally},
  title        = {Cloud-Native Application Security: Risks, Opportunities, and Challenges
                  in Securing the Evolving Attack Surface},
  journal      = {Computer},
  volume       = {54},
  number       = {11},
  pages        = {47--57},
  year         = {2021},
  url          = {https://doi.org/10.1109/MC.2021.3076537},
  doi          = {10.1109/MC.2021.3076537},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ChernyshevBZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/HuAZ21,
  author       = {Qinwen Hu and
                  Muhammad Rizwan Asghar and
                  Sherali Zeadally},
  title        = {Blockchain-based public ecosystem for auditing security of software
                  applications},
  journal      = {Computing},
  volume       = {103},
  number       = {11},
  pages        = {2643--2665},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00607-021-00954-6},
  doi          = {10.1007/S00607-021-00954-6},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/HuAZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/CaproluSP21,
  author       = {Maurantonio Caprolu and
                  Savio Sciancalepore and
                  Roberto Di Pietro},
  title        = {Short-Range Audio Channels Security: Survey of Mechanisms, Applications,
                  and Research Challenges},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {23},
  number       = {1},
  pages        = {311--340},
  year         = {2021},
  url          = {https://doi.org/10.1109/COMST.2020.2969030},
  doi          = {10.1109/COMST.2020.2969030},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsur/CaproluSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ChenYC21,
  author       = {Hsing{-}Chung Chen and
                  Wei{-}Ju Yang and
                  Chao{-}Lung Chou},
  title        = {An online cognitive authentication and trust evaluation application
                  programming interface for cognitive security gateway based on distributed
                  massive Internet of Things network},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {33},
  number       = {19},
  year         = {2021},
  url          = {https://doi.org/10.1002/cpe.6128},
  doi          = {10.1002/CPE.6128},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/ChenYC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/OgielaLF21,
  author       = {Lidia Ogiela and
                  Fang{-}Yie Leu and
                  Ugo Fiore},
  title        = {Transformative computing in security, big data analysis, and cloud
                  computing applications},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {33},
  number       = {23},
  year         = {2021},
  url          = {https://doi.org/10.1002/cpe.6654},
  doi          = {10.1002/CPE.6654},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/OgielaLF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csm/AmanJS21,
  author       = {Muhammad Naveed Aman and
                  Uzair Javaid and
                  Biplab Sikdar},
  title        = {Security Function Virtualization for IoT Applications in 6G Networks},
  journal      = {{IEEE} Commun. Stand. Mag.},
  volume       = {5},
  number       = {3},
  pages        = {90--95},
  year         = {2021},
  url          = {https://doi.org/10.1109/MCOMSTD.201.2100023},
  doi          = {10.1109/MCOMSTD.201.2100023},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csm/AmanJS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/AliCP20,
  author       = {Isra Mohamed Ali and
                  Maurantonio Caprolu and
                  Roberto Di Pietro},
  title        = {Foundations, Properties, and Security Applications of Puzzles: {A}
                  Survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {53},
  number       = {4},
  pages        = {72:1--72:38},
  year         = {2021},
  url          = {https://doi.org/10.1145/3396374},
  doi          = {10.1145/3396374},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/AliCP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/KhanPGLM20,
  author       = {Saad Khan and
                  Simon Parkinson and
                  Liam Grant and
                  Na Liu and
                  Stephen McGuire},
  title        = {Biometric Systems Utilising Health Data from Wearable Devices: Applications
                  and Future Challenges in Computer Security},
  journal      = {{ACM} Comput. Surv.},
  volume       = {53},
  number       = {4},
  pages        = {85:1--85:29},
  year         = {2021},
  url          = {https://doi.org/10.1145/3400030},
  doi          = {10.1145/3400030},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/KhanPGLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eInformatica/KlotinsUCGPTP21,
  author       = {Eriks Klotins and
                  Michael Unterkalmsteiner and
                  Panagiota Chatzipetrou and
                  Tony Gorschek and
                  Rafael Prikladnicki and
                  Nirnaya Tripathi and
                  Leandro Bento Pompermaier},
  title        = {SIoT Framework: Towards an Approach for Early Identification of Security
                  Requirements for Internet-of-things Applications},
  journal      = {e Informatica Softw. Eng. J.},
  volume       = {15},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.37190/e-inf210103},
  doi          = {10.37190/E-INF210103},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eInformatica/KlotinsUCGPTP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/GuoYL21,
  author       = {Yi Guo and
                  Jianfang Yang and
                  Baolong Liu},
  title        = {Application of chaotic encryption algorithm based on variable parameters
                  in {RFID} security},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2021},
  number       = {1},
  pages        = {155},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13638-021-02023-0},
  doi          = {10.1186/S13638-021-02023-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/GuoYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/GhosalMHS21,
  author       = {Sudipta Kumar Ghosal and
                  Souradeep Mukhopadhyay and
                  S. K. Sabbir Hossain and
                  Ram Sarkar},
  title        = {Application of Lah transform for security and privacy of data through
                  information hiding in telecommunication},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {32},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/ett.3984},
  doi          = {10.1002/ETT.3984},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/GhosalMHS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/LatifIHA21,
  author       = {Shahid Latif and
                  Zeba Idrees and
                  Zil E. Huma and
                  Jawad Ahmad},
  title        = {Blockchain technology for the industrial Internet of Things: {A} comprehensive
                  survey on security challenges, architectures, applications, and future
                  research directions},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {32},
  number       = {11},
  year         = {2021},
  url          = {https://doi.org/10.1002/ett.4337},
  doi          = {10.1002/ETT.4337},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/LatifIHA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/YadavKK21,
  author       = {Poonam Yadav and
                  Sandeep Kumar and
                  Rajesh Kumar},
  title        = {A comprehensive survey of physical layer security over fading channels:
                  Classifications, applications, and challenges},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {32},
  number       = {9},
  year         = {2021},
  url          = {https://doi.org/10.1002/ett.4270},
  doi          = {10.1002/ETT.4270},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/YadavKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/evi/PadmajaS21,
  author       = {K. Padmaja and
                  R. Seshadri},
  title        = {Analytics on real time security attacks in healthcare, retail and
                  banking applications in the cloud},
  journal      = {Evol. Intell.},
  volume       = {14},
  number       = {2},
  pages        = {595--605},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12065-019-00337-z},
  doi          = {10.1007/S12065-019-00337-Z},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/evi/PadmajaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/evi/ShendeD21,
  author       = {Priti Shende and
                  Yogesh Dandawate},
  title        = {Convolutional neural network-based feature extraction using multimodal
                  for high security application},
  journal      = {Evol. Intell.},
  volume       = {14},
  number       = {2},
  pages        = {1023--1033},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12065-020-00522-5},
  doi          = {10.1007/S12065-020-00522-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/evi/ShendeD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaacs/LiWP21,
  author       = {Xuhong Li and
                  Guan Wang and
                  Wenwen Pan},
  title        = {Research on the application of data encryption technology in communication
                  security},
  journal      = {Int. J. Auton. Adapt. Commun. Syst.},
  volume       = {14},
  number       = {1/2},
  pages        = {213--230},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJAACS.2021.114289},
  doi          = {10.1504/IJAACS.2021.114289},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijaacs/LiWP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaec/Boutekkouk21a,
  author       = {Fateh Boutekkouk},
  title        = {Application of a Fuzzy {MCDM} Method to Select the Best Operating
                  System for an Efficient Security-Aware Design of Embedded Systems},
  journal      = {Int. J. Appl. Evol. Comput.},
  volume       = {12},
  number       = {3},
  pages        = {1--20},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJAEC.2021070101},
  doi          = {10.4018/IJAEC.2021070101},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijaec/Boutekkouk21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbis/DubeM21,
  author       = {Durga Prasad Dube and
                  R. P. Mohanty},
  title        = {The application of cyber security capability maturity model to identify
                  the impact of internal efficiency factors on the external effectiveness
                  of cyber security},
  journal      = {Int. J. Bus. Inf. Syst.},
  volume       = {38},
  number       = {3},
  pages        = {367--392},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJBIS.2021.119431},
  doi          = {10.1504/IJBIS.2021.119431},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbis/DubeM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcini/LiWSGCW21,
  author       = {Yuehua Li and
                  Chengcheng Wang and
                  Jiahao Sun and
                  Zhijin Guan and
                  Jiaqing Chen and
                  Zelin Wang},
  title        = {Research and Application of Encryption System Based on Quantum Circuit
                  for Mobile Internet Security},
  journal      = {Int. J. Cogn. Informatics Nat. Intell.},
  volume       = {15},
  number       = {4},
  pages        = {1--17},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijcini.20211001.oa26},
  doi          = {10.4018/IJCINI.20211001.OA26},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcini/LiWSGCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/FineKR21,
  author       = {Benjamin Fine and
                  Martin Kreuzer and
                  Gerhard Rosenberger},
  title        = {Further potential applications of group theory in information security},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {4},
  pages        = {375--380},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2021.1931455},
  doi          = {10.1080/23799927.2021.1931455},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/FineKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/SharmaKAS21,
  author       = {Sparsh Sharma and
                  Ajay Kaul and
                  Suhaib Ahmed and
                  Surbhi Sharma},
  title        = {A detailed tutorial survey on VANETs: Emerging architectures, applications,
                  security issues, and solutions},
  journal      = {Int. J. Commun. Syst.},
  volume       = {34},
  number       = {14},
  year         = {2021},
  url          = {https://doi.org/10.1002/dac.4905},
  doi          = {10.1002/DAC.4905},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/SharmaKAS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcse/MarulliBM21,
  author       = {Fiammetta Marulli and
                  Emanuele Bellini and
                  Stefano Marrone},
  title        = {On managing security in smart e-health applications},
  journal      = {Int. J. Comput. Sci. Eng.},
  volume       = {24},
  number       = {6},
  pages        = {639--652},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJCSE.2021.119989},
  doi          = {10.1504/IJCSE.2021.119989},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcse/MarulliBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcvip/SoualmiAL21,
  author       = {Abdallah Soualmi and
                  Adel Alti and
                  Lamri Laouamer},
  title        = {Multiple Blind Watermarking Framework for Security and Integrity of
                  Medical Images in E-Health Applications},
  journal      = {Int. J. Comput. Vis. Image Process.},
  volume       = {11},
  number       = {1},
  pages        = {1--16},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCVIP.2021010101},
  doi          = {10.4018/IJCVIP.2021010101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcvip/SoualmiAL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/RussoVAM21,
  author       = {Enrico Russo and
                  Luca Verderame and
                  Alessandro Armando and
                  Alessio Merlo},
  title        = {{DIOXIN:} runtime security policy enforcement of fog applications},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {12},
  number       = {2},
  pages        = {126--138},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJGUC.2021.114821},
  doi          = {10.1504/IJGUC.2021.114821},
  timestamp    = {Tue, 25 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/RussoVAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/AbozeidAE21,
  author       = {Amr Abd Elawed Abozeid and
                  AbdAllah A. AlHabshy and
                  Kamal A. ElDahshan},
  title        = {A Software Security Optimization Architecture (SoSOA) and its Adaptation
                  for Mobile Applications},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {15},
  number       = {11},
  pages        = {148},
  year         = {2021},
  url          = {https://doi.org/10.3991/ijim.v15i11.20133},
  doi          = {10.3991/IJIM.V15I11.20133},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/AbozeidAE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/HammoudehAAA21,
  author       = {Mohammad Ali A. Hammoudeh and
                  Ali Alobaid and
                  Ali Alwabli and
                  Faris Alabdulmunim},
  title        = {The Study on Assessment of Security Web Applications},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {15},
  number       = {23},
  pages        = {120--135},
  year         = {2021},
  url          = {https://doi.org/10.3991/ijim.v15i23.27357},
  doi          = {10.3991/IJIM.V15I23.27357},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/HammoudehAAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/MonalisaHFIM21,
  author       = {Natasha Tanzila Monalisa and
                  Shinthi Tasnim Himi and
                  Nayeema Ferdous and
                  Md. Ezharul Islam and
                  Anup Majumder},
  title        = {"SuperWomen": {A} Smart Mobile Application for Social Security focusing
                  Threats and Supports for Women},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {15},
  number       = {3},
  pages        = {97--112},
  year         = {2021},
  url          = {https://doi.org/10.3991/ijim.v15i03.17555},
  doi          = {10.3991/IJIM.V15I03.17555},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/MonalisaHFIM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/Reshan21,
  author       = {Mana Saleh Al Reshan},
  title        = {IoT-based Application of Information Security Triad},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {15},
  number       = {24},
  pages        = {61--76},
  year         = {2021},
  url          = {https://doi.org/10.3991/ijim.v15i24.27333},
  doi          = {10.3991/IJIM.V15I24.27333},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/Reshan21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/ZhaoWWG21,
  author       = {Mengwei Zhao and
                  Guiwu Wei and
                  Cun Wei and
                  Yanfeng Guo},
  title        = {{CPT-TODIM} method for bipolar fuzzy multi-attribute group decision
                  making and its application to network security service provider selection},
  journal      = {Int. J. Intell. Syst.},
  volume       = {36},
  number       = {5},
  pages        = {1943--1969},
  year         = {2021},
  url          = {https://doi.org/10.1002/int.22367},
  doi          = {10.1002/INT.22367},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/ZhaoWWG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/Elmorshidy21,
  author       = {Ahmed Elmorshidy},
  title        = {M-Commerce Security: Assessing the Value of Mobile Applications Used
                  in Controlling Internet Security Cameras at Home and Office - An Empirical
                  Study},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {15},
  number       = {4},
  pages        = {79--97},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJISP.2021100105},
  doi          = {10.4018/IJISP.2021100105},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisp/Elmorshidy21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijista/MattosMPFMMA21,
  author       = {Diogo Menezes Ferrazani Mattos and
                  Dianne Scherly Varela de Medeiros and
                  Diego G. Passos and
                  Natalia Castro Fernandes and
                  D{\'{e}}bora Christina Muchaluat{-}Saade and
                  Igor Monteiro Moraes and
                  C{\'{e}}lio Vinicius N. de Albuquerque},
  title        = {Blockchain for smart grid security: applications, trends, and challenges},
  journal      = {Int. J. Intell. Syst. Technol. Appl.},
  volume       = {20},
  number       = {4},
  pages        = {296--309},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJISTA.2021.121323},
  doi          = {10.1504/IJISTA.2021.121323},
  timestamp    = {Tue, 23 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijista/MattosMPFMMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/GranaLMHQC21,
  author       = {Manuel Gra{\~{n}}a and
                  Jos{\'{e}} Manuel L{\'{o}}pez{-}Guede and
                  Jos{\'{e}} Ant{\'{o}}nio S{\'{a}}ez Mu{\~{n}}oz and
                  {\'{A}}lvaro Herrero and
                  H{\'{e}}ctor Quinti{\'{a}}n and
                  Emilio Corchado},
  title        = {Special issue {SOCO-CISIS} 2018: New trends in soft computing and
                  computational intelligence in security and its application in industrial
                  and environmental problems},
  journal      = {Neurocomputing},
  volume       = {452},
  pages        = {414--415},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.neucom.2020.09.058},
  doi          = {10.1016/J.NEUCOM.2020.09.058},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/GranaLMHQC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/Olvera-Martinez21,
  author       = {L. Olvera{-}Martinez and
                  T. Jimenez{-}Borgonio and
                  T. Frias{-}Carmona and
                  M. Abarca{-}Rodriguez and
                  C. Diaz{-}Rodriguez and
                  Manuel Cedillo{-}Hernandez and
                  Mariko Nakano{-}Miyatake and
                  H{\'{e}}ctor P{\'{e}}rez{-}Meana},
  title        = {First {SN} {P} visual cryptographic circuit with astrocyte control
                  of structural plasticity for security applications},
  journal      = {Neurocomputing},
  volume       = {457},
  pages        = {67--73},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.neucom.2021.05.057},
  doi          = {10.1016/J.NEUCOM.2021.05.057},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/Olvera-Martinez21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwin/AnanthiJ21,
  author       = {J. Vijitha Ananthi and
                  P. Subha Hency Jose},
  title        = {A Perspective Review of Security Challenges in Body Area Networks
                  for Healthcare Applications},
  journal      = {Int. J. Wirel. Inf. Networks},
  volume       = {28},
  number       = {4},
  pages        = {451--466},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10776-021-00538-3},
  doi          = {10.1007/S10776-021-00538-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwin/AnanthiJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/JingFHQ21,
  author       = {Jing Wang and
                  Fangfang Liu and
                  Hongyan Liu and
                  Qingqing Wang},
  title        = {Application of deep learning in network security fault diagnosis and
                  prediction},
  journal      = {Int. J. Wirel. Mob. Comput.},
  volume       = {20},
  number       = {4},
  pages        = {381--389},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJWMC.2021.117570},
  doi          = {10.1504/IJWMC.2021.117570},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijwmc/JingFHQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/LaverdiereJM21,
  author       = {Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
                  Karl Julien and
                  Ettore Merlo},
  title        = {{RBAC} protection-impacting changes identification: {A} case study
                  of the security evolution of two {PHP} applications},
  journal      = {Inf. Softw. Technol.},
  volume       = {139},
  pages        = {106630},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.infsof.2021.106630},
  doi          = {10.1016/J.INFSOF.2021.106630},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/LaverdiereJM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/BhuiyanRBS21,
  author       = {Mohammad Nuruzzaman Bhuiyan and
                  Md. Mahbubur Rahman and
                  Md Masum Billah and
                  Dipanita Saha},
  title        = {Internet of Things (IoT): {A} Review of Its Enabling Technologies
                  in Healthcare Applications, Standards Protocols, Security, and Market
                  Opportunities},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {13},
  pages        = {10474--10498},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2021.3062630},
  doi          = {10.1109/JIOT.2021.3062630},
  timestamp    = {Fri, 20 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/BhuiyanRBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HassijaCGJG21,
  author       = {Vikas Hassija and
                  Vinay Chamola and
                  Vatsal Gupta and
                  Sarthak Jain and
                  Nadra Guizani},
  title        = {A Survey on Supply Chain Security: Application Areas, Security Threats,
                  and Solution Architectures},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {8},
  pages        = {6222--6246},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3025775},
  doi          = {10.1109/JIOT.2020.3025775},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/HassijaCGJG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiCCMM21,
  author       = {Xinghua Li and
                  Ting Chen and
                  Qingfeng Cheng and
                  Siqi Ma and
                  Jianfeng Ma},
  title        = {Smart Applications in Edge Computing: Overview on Authentication and
                  Data Security},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {6},
  pages        = {4063--4080},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3019297},
  doi          = {10.1109/JIOT.2020.3019297},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiCCMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/LiSZ21,
  author       = {Weiwei Li and
                  Zhou Su and
                  Kuan Zhang},
  title        = {Security Solutions for IoT-Enabled Applications Against the Disease
                  Pandemic},
  journal      = {{IEEE} Internet Things Mag.},
  volume       = {4},
  number       = {4},
  pages        = {100--106},
  year         = {2021},
  url          = {https://doi.org/10.1109/IOTM.001.2100056},
  doi          = {10.1109/IOTM.001.2100056},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotm/LiSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AlbulayhiI21,
  author       = {Mohammed S. Albulayhi and
                  Dina M. Ibrahim},
  title        = {Open Web Application Security Project Components with Known Vulnerabilities:
                  {A} Comprehensive Study},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {59--67},
  year         = {2021},
  url          = {https://doi.org/10.22042/isecure.2021.0.0.0},
  doi          = {10.22042/ISECURE.2021.0.0.0},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/AlbulayhiI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AhmadKAKC21a,
  author       = {Khaleel Ahmad and
                  Afsar Kamal and
                  Khairol Amali Bin Ahmad and
                  Manju Khari and
                  Rub{\'{e}}n Gonz{\'{a}}lez Crespo},
  title        = {Corrigendum to Fast hybrid-MixNet for security and privacy using {NTRU}
                  algorithm: [Journal of Information Security and Applications, Volume
                  60, August 2021, Start page-End page/102872]},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102917},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102917},
  doi          = {10.1016/J.JISA.2021.102917},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AhmadKAKC21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HusseinSMO21,
  title        = {Retraction notice to "A Hybrid Security Strategy {(HS2)} for Reliable
                  Video Streaming in Fog Computing" Journal of Information Security
                  and Applications 51 {(2020)} 102412},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102807},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102807},
  doi          = {10.1016/J.JISA.2021.102807},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HusseinSMO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VijayI21,
  author       = {M. Vijay and
                  G. Indumathi},
  title        = {Deep belief network-based hybrid model for multimodal biometric system
                  for futuristic security applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102707},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102707},
  doi          = {10.1016/J.JISA.2020.102707},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/VijayI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/RoyRBB21,
  author       = {Siddhartha Roy and
                  Saptarshi Roy and
                  Arpita Biswas and
                  Krishna Lal Baishnab},
  title        = {{LCB:} Light Cipher Block An Ultrafast Lightweight Block Cipher For
                  Resource Constrained {IOT} Security Applications},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {15},
  number       = {11},
  pages        = {4122--4144},
  year         = {2021},
  url          = {https://doi.org/10.3837/tiis.2021.11.014},
  doi          = {10.3837/TIIS.2021.11.014},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/RoyRBB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jamia/TangariISIKB21,
  author       = {Gioacchino Tangari and
                  Muhammad Ikram and
                  I Wayan Budi Sentana and
                  Kiran Ijaz and
                  Mohamed Ali K{\^{a}}afar and
                  Shlomo Berkovsky},
  title        = {Analyzing security issues of android mobile health and medical applications},
  journal      = {J. Am. Medical Informatics Assoc.},
  volume       = {28},
  number       = {10},
  pages        = {2074--2084},
  year         = {2021},
  url          = {https://doi.org/10.1093/jamia/ocab131},
  doi          = {10.1093/JAMIA/OCAB131},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jamia/TangariISIKB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbcs/OliveiraMS21,
  author       = {Mateus de Oliveira and
                  Adriana Prest Mattedi and
                  Rodrigo Duarte Seabra},
  title        = {Usability evaluation model of an application with emphasis on collaborative
                  security: an approach from social dimensions},
  journal      = {J. Braz. Comput. Soc.},
  volume       = {27},
  number       = {1},
  pages        = {3},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13173-021-00108-8},
  doi          = {10.1186/S13173-021-00108-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jbcs/OliveiraMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbd/AfizaMHWZIRS21,
  author       = {Mat Razali Noor Afiza and
                  Nur Atiqah Malizan and
                  Nor Asiakin Hasbullah and
                  Muslihah Wook and
                  Norulzahrah Mohd Zainuddin and
                  Khairul Khalil Ishak and
                  Suzaimah Ramli and
                  Sazali Sukardi},
  title        = {Opinion mining for national security: techniques, domain applications,
                  challenges and research opportunities},
  journal      = {J. Big Data},
  volume       = {8},
  number       = {1},
  pages        = {150},
  year         = {2021},
  url          = {https://doi.org/10.1186/s40537-021-00536-5},
  doi          = {10.1186/S40537-021-00536-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jbd/AfizaMHWZIRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbi/ArshadAKP21,
  author       = {Saadia Arshad and
                  Junaid Arshad and
                  Muhammad Mubashir Khan and
                  Simon Parkinson},
  title        = {Analysis of security and privacy challenges for DNA-genomics applications
                  and databases},
  journal      = {J. Biomed. Informatics},
  volume       = {119},
  pages        = {103815},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jbi.2021.103815},
  doi          = {10.1016/J.JBI.2021.103815},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jbi/ArshadAKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LiS0RKP21,
  author       = {Guangjun Li and
                  Preetpal Sharma and
                  Lei Pan and
                  Sutharshan Rajasegarar and
                  Chandan K. Karmakar and
                  Nicholas Charles Patterson},
  title        = {Deep learning algorithms for cyber security applications: {A} survey},
  journal      = {J. Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {447--471},
  year         = {2021},
  url          = {https://doi.org/10.3233/JCS-200095},
  doi          = {10.3233/JCS-200095},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LiS0RKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/UganyaV21,
  author       = {G. Uganya and
                  N. Vijayaraj},
  title        = {A Survey on Internet of Things: Applications, Recent Issues, Attacks,
                  and Security Mechanisms},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {30},
  number       = {5},
  pages        = {2130006:1--2130006:46},
  year         = {2021},
  url          = {https://doi.org/10.1142/S0218126621300063},
  doi          = {10.1142/S0218126621300063},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/UganyaV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/NicholasSJWS21,
  author       = {Geraldine Shirley Nicholas and
                  Ali Shuja Siddiqui and
                  Sam Reji Joseph and
                  Gregory Williams and
                  Fareena Saqib},
  title        = {A Secure Boot Framework with Multi-security Features and Logic-Locking
                  Applications for Reconfigurable Logic},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {260--268},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41635-021-00123-3},
  doi          = {10.1007/S41635-021-00123-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/NicholasSJWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jices/GhandourSS21,
  author       = {Ahmad Ghandour and
                  Viktor Shestak and
                  Konstantin Sokolovskiy},
  title        = {Security and privacy of adolescents in social applications and networks:
                  legislative aspects and legal practice of countering cyberbullying
                  on example of developed and developing countries},
  journal      = {J. Inf. Commun. Ethics Soc.},
  volume       = {19},
  number       = {4},
  pages        = {433--445},
  year         = {2021},
  url          = {https://doi.org/10.1108/JICES-09-2020-0101},
  doi          = {10.1108/JICES-09-2020-0101},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jices/GhandourSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jikm/AhmedK21,
  author       = {Mohammed Imtyaz Ahmed and
                  G. Kannan},
  title        = {Cloud-Based Remote {RFID} Authentication for Security of Smart Internet
                  of Things Applications},
  journal      = {J. Inf. Knowl. Manag.},
  volume       = {20},
  number       = {Supplement-1},
  pages        = {2140004:1--2140004:20},
  year         = {2021},
  url          = {https://doi.org/10.1142/S0219649221400049},
  doi          = {10.1142/S0219649221400049},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jikm/AhmedK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmihi/RajakumaranR21,
  author       = {M. Rajakumaran and
                  S. Ramabalan},
  title        = {Security for the Networked Robot Operating System for Biomedical Applications},
  journal      = {J. Medical Imaging Health Informatics},
  volume       = {11},
  number       = {12},
  pages        = {2937--2949},
  year         = {2021},
  url          = {https://doi.org/10.1166/jmihi.2021.3878},
  doi          = {10.1166/JMIHI.2021.3878},
  timestamp    = {Tue, 30 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmihi/RajakumaranR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmihi/WuX21,
  author       = {Xiang Wu and
                  Kaijian Xia},
  title        = {A Special Section on The Development and Application of Medical Data
                  Processing and Security Sharing Technology},
  journal      = {J. Medical Imaging Health Informatics},
  volume       = {11},
  number       = {3},
  pages        = {869--870},
  year         = {2021},
  url          = {https://doi.org/10.1166/jmihi.2021.3409},
  doi          = {10.1166/JMIHI.2021.3409},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmihi/WuX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AmanHSAAL21,
  author       = {Azana Hafizah Mohd Aman and
                  Wan Haslina Hassan and
                  Shilan Sameen and
                  Zainab Senan Attarbashi and
                  Mojtaba Alizadeh and
                  Liza Abdul Latiff},
  title        = {IoMT amid {COVID-19} pandemic: Application, architecture, technology,
                  and security},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {174},
  pages        = {102886},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2020.102886},
  doi          = {10.1016/J.JNCA.2020.102886},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AmanHSAAL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/LabordeBWOB21,
  author       = {Romain Laborde and
                  Sravani Teja Bulusu and
                  Ahmad Samer Wazan and
                  Arnaud Oglaza and
                  Abdelmalek Benzekri},
  title        = {A Methodological Approach to Evaluate Security Requirements Engineering
                  Methodologies: Application to the {IREHDO2} Project Context},
  journal      = {J. Cybersecur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {422--452},
  year         = {2021},
  url          = {https://doi.org/10.3390/jcp1030022},
  doi          = {10.3390/JCP1030022},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/LabordeBWOB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jois/ZhuGAAM21,
  author       = {Yongkuan Zhu and
                  Gurjot Singh Gaba and
                  Fahad M. Almansour and
                  Roobaea Alroobaea and
                  Mehedi Masud},
  title        = {Application of data mining technology in detecting network intrusion
                  and security maintenance},
  journal      = {J. Intell. Syst.},
  volume       = {30},
  number       = {1},
  pages        = {664--676},
  year         = {2021},
  url          = {https://doi.org/10.1515/jisys-2020-0146},
  doi          = {10.1515/JISYS-2020-0146},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jois/ZhuGAAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/SinghLSS21,
  author       = {Akansha Singh and
                  Ping Li and
                  Krishna Kant Singh and
                  Vijayalakshmi Saravana},
  title        = {Real-time intelligent image processing for security applications},
  journal      = {J. Real Time Image Process.},
  volume       = {18},
  number       = {5},
  pages        = {1787--1788},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11554-021-01169-w},
  doi          = {10.1007/S11554-021-01169-W},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jrtip/SinghLSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/WangMSSGMB21,
  author       = {Yajing Wang and
                  Juan Ma and
                  Ashutosh Sharma and
                  Pradeep Kumar Singh and
                  Gurjot Singh Gaba and
                  Mehedi Masud and
                  Mohammed Baz},
  title        = {An Exhaustive Research on the Application of Intrusion Detection Technology
                  in Computer Network Security in Sensor Networks},
  journal      = {J. Sensors},
  volume       = {2021},
  pages        = {5558860:1--5558860:11},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5558860},
  doi          = {10.1155/2021/5558860},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/js/WangMSSGMB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/BlochGYOPSS21,
  author       = {Matthieu R. Bloch and
                  Onur G{\"{u}}nl{\"{u}} and
                  Aylin Yener and
                  Fr{\'{e}}d{\'{e}}rique E. Oggier and
                  H. Vincent Poor and
                  Lalitha Sankar and
                  Rafael F. Schaefer},
  title        = {An Overview of Information-Theoretic Security and Privacy: Metrics,
                  Limits and Applications},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {5--22},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3062755},
  doi          = {10.1109/JSAIT.2021.3062755},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/BlochGYOPSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/BernardiGMMN21,
  author       = {Simona Bernardi and
                  Ugo Gentile and
                  Stefano Marrone and
                  Jos{\'{e}} Merseguer and
                  Roberto Nardone},
  title        = {Security modelling and formal verification of survivability properties:
                  Application to cyber-physical systems},
  journal      = {J. Syst. Softw.},
  volume       = {171},
  pages        = {110746},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jss.2020.110746},
  doi          = {10.1016/J.JSS.2020.110746},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/BernardiGMMN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jus/DaiYP21,
  author       = {Boyang Dai and
                  Xiangfeng Yang and
                  Gyei{-}Kark Park},
  title        = {The Core of Uncertain Coalitional Game Based on Hurwicz Criterion
                  with Application to Cyber Security Information Sharing},
  journal      = {J. Uncertain Syst.},
  volume       = {14},
  number       = {1},
  pages        = {2150003},
  year         = {2021},
  url          = {https://doi.org/10.1142/s1752890921500033},
  doi          = {10.1142/S1752890921500033},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jus/DaiYP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/HomayCBSW21,
  author       = {Aydin E. Homay and
                  Christos Chrysoulas and
                  Brahim El Boudani and
                  M{\'{a}}rio de Sousa and
                  Martin Wollschlaeger},
  title        = {A security and authentication layer for {SCADA/DCS} applications},
  journal      = {Microprocess. Microsystems},
  volume       = {87},
  pages        = {103479},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.micpro.2020.103479},
  doi          = {10.1016/J.MICPRO.2020.103479},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/HomayCBSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/SanyalMS21,
  author       = {Pallab Sanyal and
                  Nirup M. Menon and
                  Mikko T. Siponen},
  title        = {An Empirical Examination of the Economics of Mobile Application Security},
  journal      = {{MIS} Q.},
  volume       = {45},
  number       = {4},
  pages        = {2235--2260},
  year         = {2021},
  url          = {https://doi.org/10.25300/misq/2021/15315},
  doi          = {10.25300/MISQ/2021/15315},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/misq/SanyalMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AngaritaC21,
  author       = {Maria Alejandra Osorio Angarita and
                  Agust{\'{\i}}n Moreno Ca{\~{n}}adas},
  title        = {Brauer configuration algebras for multimedia based cryptography and
                  security applications},
  journal      = {Multim. Tools Appl.},
  volume       = {80},
  number       = {15},
  pages        = {23485--23510},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11042-020-10239-3},
  doi          = {10.1007/S11042-020-10239-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/AngaritaC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ShahSAHK21,
  author       = {Dawood Shah and
                  Tariq Shah and
                  Imtiaz Ahamad and
                  Muhammad Imran Haider and
                  Ijaz Khalid},
  title        = {A three-dimensional chaotic map and their applications to digital
                  audio security},
  journal      = {Multim. Tools Appl.},
  volume       = {80},
  number       = {14},
  pages        = {22251--22273},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11042-021-10697-3},
  doi          = {10.1007/S11042-021-10697-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ShahSAHK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ThankiK21,
  author       = {Rohit M. Thanki and
                  Ashish Kothari},
  title        = {Multi-level security of medical images based on encryption and watermarking
                  for telemedicine applications},
  journal      = {Multim. Tools Appl.},
  volume       = {80},
  number       = {3},
  pages        = {4307--4325},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11042-020-09941-z},
  doi          = {10.1007/S11042-020-09941-Z},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ThankiK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/ZhaoZWLGS21,
  author       = {Hongwei Zhao and
                  Moli Zhang and
                  Shi Wang and
                  Entang Li and
                  Zhenhua Guo and
                  Dianmin Sun},
  title        = {Security risk and response analysis of typical application architecture
                  of information and communication blockchain},
  journal      = {Neural Comput. Appl.},
  volume       = {33},
  number       = {13},
  pages        = {7661--7671},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00521-020-05508-z},
  doi          = {10.1007/S00521-020-05508-Z},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/nca/ZhaoZWLGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Valani21,
  author       = {Altaz Valani},
  title        = {A multi-pronged approach to effective application security},
  journal      = {Netw. Secur.},
  volume       = {2021},
  number       = {8},
  pages        = {18--19},
  year         = {2021},
  url          = {https://doi.org/10.1016/S1353-4858(21)00092-1},
  doi          = {10.1016/S1353-4858(21)00092-1},
  timestamp    = {Fri, 10 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ns/Valani21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerj-cs/EduAA21,
  author       = {Sampson Abeeku Edu and
                  Mary Agoyi and
                  Divine Quazie Agozie},
  title        = {Digital security vulnerabilities and threats implications for financial
                  institutions deploying digital technology platforms and application:
                  {FMEA} and {FTOPSIS} analysis},
  journal      = {PeerJ Comput. Sci.},
  volume       = {7},
  pages        = {e658},
  year         = {2021},
  url          = {https://doi.org/10.7717/peerj-cs.658},
  doi          = {10.7717/PEERJ-CS.658},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/peerj-cs/EduAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AlzoubiOJA21,
  author       = {Yehia Ibrahim Alzoubi and
                  Valmira H. Osmanaj and
                  Ashraf Jaradat and
                  Ahmad Salah Al{-}Ahmad},
  title        = {Fog computing security and privacy for the Internet of Thing applications:
                  State-of-the-art},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.145},
  doi          = {10.1002/SPY2.145},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/AlzoubiOJA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuangXYWLW21,
  author       = {Binbin Huang and
                  Yuanyuan Xiang and
                  Dongjin Yu and
                  Jiaojiao Wang and
                  Zhongjin Li and
                  Shangguang Wang},
  title        = {Reinforcement Learning for Security-Aware Workflow Application Scheduling
                  in Mobile Edge Computing},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {5532410:1--5532410:13},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5532410},
  doi          = {10.1155/2021/5532410},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuangXYWLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JalbaniYSOHM21,
  author       = {Khuda Bux Jalbani and
                  Muhammad Yousaf and
                  Muhammad Shahzad Sarfraz and
                  Rozita Jamili Oskouei and
                  Akhtar Hussain and
                  Zojan Memon},
  title        = {Poor Coding Leads to DoS Attack and Security Issues in Web Applications
                  for Sensors},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {5523806:1--5523806:11},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5523806},
  doi          = {10.1155/2021/5523806},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JalbaniYSOHM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YaoSZ21,
  author       = {Zhi Yao and
                  Hailing Sun and
                  Guofu Zhou},
  title        = {Real-Time Facial Expression Recognition System for Video Big Sensor
                  Data Security Application},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {9539022:1--9539022:10},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/9539022},
  doi          = {10.1155/2021/9539022},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YaoSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AbosataAIE21,
  author       = {Nasr Abosata and
                  Saba Al{-}Rubaye and
                  G{\"{o}}khan Inalhan and
                  Christos Emmanouilidis},
  title        = {Internet of Things for System Integrity: {A} Comprehensive Survey
                  on Security, Attacks and Countermeasures for Industrial Applications},
  journal      = {Sensors},
  volume       = {21},
  number       = {11},
  pages        = {3654},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21113654},
  doi          = {10.3390/S21113654},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/AbosataAIE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/BastosRSRRFBRP21,
  author       = {David Bastos and
                  Jos{\'{e}} Ribeiro and
                  Fernando Silva and
                  M{\'{a}}rio Rodrigues and
                  Carlos Rabad{\~{a}}o and
                  Antonio Fern{\'{a}}ndez{-}Caballero and
                  Jo{\~{a}}o Paulo Barraca and
                  Nelson Pacheco da Rocha and
                  Ant{\'{o}}nio Pereira},
  title        = {Security Mechanisms of a Mobile Health Application for Promoting Physical
                  Activity among Older Adults},
  journal      = {Sensors},
  volume       = {21},
  number       = {21},
  pages        = {7323},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21217323},
  doi          = {10.3390/S21217323},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/BastosRSRRFBRP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/CarvalhoG21,
  author       = {Kevin Carvalho and
                  Jorge Granjal},
  title        = {Security and Privacy for Mobile IoT Applications Using Blockchain},
  journal      = {Sensors},
  volume       = {21},
  number       = {17},
  pages        = {5931},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21175931},
  doi          = {10.3390/S21175931},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/CarvalhoG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ShiehLH21,
  author       = {Min{-}Zheng Shieh and
                  Yi{-}Bing Lin and
                  Ying Jui Hsu},
  title        = {VerificationTalk: {A} Verification and Security Mechanism for IoT
                  Applications},
  journal      = {Sensors},
  volume       = {21},
  number       = {22},
  pages        = {7449},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21227449},
  doi          = {10.3390/S21227449},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/ShiehLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/VulpeCDKPZ21,
  author       = {Alexandru Vulpe and
                  Razvan Craciunescu and
                  Ana{-}Maria Dragulinescu and
                  Sofoklis A. Kyriazakos and
                  Ali Paikan and
                  Pouyan Ziafati},
  title        = {Enabling Security Services in Socially Assistive Robot Scenarios for
                  Healthcare Applications},
  journal      = {Sensors},
  volume       = {21},
  number       = {20},
  pages        = {6912},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21206912},
  doi          = {10.3390/S21206912},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/VulpeCDKPZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/PathakPRC21,
  author       = {Prabesh Pathak and
                  Prabesh Poudel and
                  Sankardas Roy and
                  Doina Caragea},
  title        = {Leveraging attention-based deep neural networks for security vetting
                  of Android applications},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {29},
  pages        = {e2},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.27-9-2021.171168},
  doi          = {10.4108/EAI.27-9-2021.171168},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/PathakPRC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/snam/NabiTY21,
  author       = {Faisal Nabi and
                  Xiaohui Tao and
                  Jianming Yong},
  title        = {Security aspects in modern service component-oriented application
                  logic for social e-commerce systems},
  journal      = {Soc. Netw. Anal. Min.},
  volume       = {11},
  number       = {1},
  pages        = {22},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13278-020-00717-9},
  doi          = {10.1007/S13278-020-00717-9},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/snam/NabiTY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/SowmiyaASRTV21,
  author       = {B. Sowmiya and
                  V. S. Abhijith and
                  S. Sudersan and
                  Sakthi Jaya Sundar Rajasekar and
                  M. Thangavel and
                  P. Varalakshmi},
  title        = {A Survey on Security and Privacy Issues in Contact Tracing Application
                  of Covid-19},
  journal      = {{SN} Comput. Sci.},
  volume       = {2},
  number       = {2},
  pages        = {136},
  year         = {2021},
  url          = {https://doi.org/10.1007/s42979-021-00520-z},
  doi          = {10.1007/S42979-021-00520-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/SowmiyaASRTV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/SimicRFI21,
  author       = {Goran Simic and
                  Mirjana Radovanovic and
                  Sanja Filipovic and
                  Olga Mirkovic Isaeva},
  title        = {Fuzzy logic approach in energy security decision-making: "ESecFuzzy"
                  software application},
  journal      = {Soft Comput.},
  volume       = {25},
  number       = {16},
  pages        = {10813--10828},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00500-021-05976-y},
  doi          = {10.1007/S00500-021-05976-Y},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/SimicRFI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sp/WangW21b,
  author       = {Zhihui Wang and
                  Jinyu Wang},
  title        = {Applications of Machine Learning in Public Security Information and
                  Resource Management},
  journal      = {Sci. Program.},
  volume       = {2021},
  pages        = {4734187:1--4734187:9},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/4734187},
  doi          = {10.1155/2021/4734187},
  timestamp    = {Thu, 17 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sp/WangW21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/ChenLCW21,
  author       = {Tzung{-}Her Chen and
                  Wei{-}Bin Lee and
                  Hsing{-}Bai Chen and
                  Chien{-}Lung Wang},
  title        = {Revisited - The Subliminal Channel in Blockchain and Its Application
                  to IoT Security},
  journal      = {Symmetry},
  volume       = {13},
  number       = {5},
  pages        = {855},
  year         = {2021},
  url          = {https://doi.org/10.3390/sym13050855},
  doi          = {10.3390/SYM13050855},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/ChenLCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/ShantaMHR21,
  author       = {Aysha S. Shanta and
                  Md. Badruddoja Majumder and
                  Md Sakib Hasan and
                  Garrett S. Rose},
  title        = {Physically Unclonable and Reconfigurable Computing System {(PURCS)}
                  for Hardware Security Applications},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {40},
  number       = {3},
  pages        = {405--418},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCAD.2020.2999907},
  doi          = {10.1109/TCAD.2020.2999907},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/ShantaMHR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/MengHYKLWQ21,
  author       = {Shunmei Meng and
                  Weijia Huang and
                  Xiaochun Yin and
                  Mohammad Reza Khosravi and
                  Qianmu Li and
                  Shaohua Wan and
                  Lianyong Qi},
  title        = {Security-Aware Dynamic Scheduling for Real-Time Optimization in Cloud-Based
                  Industrial Applications},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {6},
  pages        = {4219--4228},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.2995348},
  doi          = {10.1109/TII.2020.2995348},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/MengHYKLWQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/XieYWZXL21,
  author       = {Guoqi Xie and
                  Laurence T. Yang and
                  Wei Wu and
                  Keyu Zeng and
                  Xiangzhen Xiao and
                  Renfa Li},
  title        = {Security Enhancement for Real-Time Parallel In-Vehicle Applications
                  by {CAN} {FD} Message Authentication},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {22},
  number       = {8},
  pages        = {5038--5049},
  year         = {2021},
  url          = {https://doi.org/10.1109/TITS.2020.3000783},
  doi          = {10.1109/TITS.2020.3000783},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/XieYWZXL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/BhartiBS21,
  author       = {Vandana Bharti and
                  Bhaskar Biswas and
                  Kaushal Kumar Shukla},
  title        = {A Novel Multiobjective {GDWCN-PSO} Algorithm and Its Application to
                  Medical Data Security},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {21},
  number       = {2},
  pages        = {46:1--46:28},
  year         = {2021},
  url          = {https://doi.org/10.1145/3397679},
  doi          = {10.1145/3397679},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/BhartiBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/0001LK21,
  author       = {Amit Kumar Singh and
                  Zhihan Lv and
                  Hoon Ko},
  title        = {Introduction to the Special Issue on Recent Trends in Medical Data
                  Security for e-Health Applications},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {17},
  number       = {2s},
  pages        = {58:1--58:3},
  year         = {2021},
  url          = {https://doi.org/10.1145/3459601},
  doi          = {10.1145/3459601},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/0001LK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/KrishnanJJAB21,
  author       = {Prabhakar Krishnan and
                  Kurunandan Jain and
                  Pramod George Jose and
                  Krishnashree Achuthan and
                  Rajkumar Buyya},
  title        = {{SDN} Enabled QoE and Security Framework for Multimedia Applications
                  in 5G Networks},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {17},
  number       = {2},
  pages        = {39:1--39:29},
  year         = {2021},
  url          = {https://doi.org/10.1145/3377390},
  doi          = {10.1145/3377390},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/KrishnanJJAB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/SharmaK21,
  author       = {Surbhi Sharma and
                  Baijnath Kaushik},
  title        = {Corrigendum to "A survey on internet of vehicles: Applications, security
                  issues {\&} solutions" [Veh. Commun. 20 {(2019)} 100182]},
  journal      = {Veh. Commun.},
  volume       = {27},
  pages        = {100289},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.vehcom.2020.100289},
  doi          = {10.1016/J.VEHCOM.2020.100289},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vcomm/SharmaK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LiuGW21,
  author       = {Xiangyu Liu and
                  Lei Guo and
                  Xuetao Wei},
  title        = {Indoor Visible Light Applications for Communication, Positioning,
                  and Security},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2021},
  pages        = {1730655:1--1730655:10},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/1730655},
  doi          = {10.1155/2021/1730655},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/LiuGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/KambojJV21,
  author       = {Anil Kumar Kamboj and
                  Poonam Jindal and
                  Pankaj Verma},
  title        = {Machine learning-based physical layer security: techniques, open challenges,
                  and applications},
  journal      = {Wirel. Networks},
  volume       = {27},
  number       = {8},
  pages        = {5351--5383},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11276-021-02781-1},
  doi          = {10.1007/S11276-021-02781-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/KambojJV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/RajendranDMB21,
  author       = {Sujarani Rajendran and
                  Manivannan Doraipandian and
                  Ramachandran Manikandan and
                  Vidhyacharan Bhaskar},
  title        = {Lightweight Bio-Chaos Crypt to Enhance the Security of Biometric Images
                  in Internet of Things Applications},
  journal      = {Wirel. Pers. Commun.},
  volume       = {119},
  number       = {3},
  pages        = {2517--2537},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11277-021-08342-1},
  doi          = {10.1007/S11277-021-08342-1},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/RajendranDMB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aces/LeMM21,
  author       = {Vu Le and
                  Ramin Moazeni and
                  Melody Moh},
  editor       = {Nibras Abdullah and
                  Selvakumar Manickam and
                  Mohammed Anbar},
  title        = {Improving Security and Performance of Distributed IPFS-Based Web Applications
                  with Blockchain},
  booktitle    = {Advances in Cyber Security - Third International Conference, ACeS
                  2021, Penang, Malaysia, August 24-25, 2021, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1487},
  pages        = {114--127},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-8059-5\_8},
  doi          = {10.1007/978-981-16-8059-5\_8},
  timestamp    = {Fri, 26 Apr 2024 12:46:20 +0200},
  biburl       = {https://dblp.org/rec/conf/aces/LeMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Munch0Y21,
  author       = {Jean{-}Pierre M{\"{u}}nch and
                  Thomas Schneider and
                  Hossein Yalame},
  title        = {{VASA:} Vector {AES} Instructions for Security Applications},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {131--145},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485897},
  doi          = {10.1145/3485832.3485897},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Munch0Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ahfe/OravecHSSG21,
  author       = {Milan Oravec and
                  Frantisek Hesko and
                  Zolt{\'{a}}n Szoke and
                  Miroslav Smelko and
                  Tomas Gazda},
  editor       = {Ravindra S. Goonetilleke and
                  Shuping Xiong and
                  Henrijs Kalkis and
                  Zenija Roja and
                  Waldemar Karwowski and
                  Atsuo Murata},
  title        = {Magnetometry for Security Applications},
  booktitle    = {Advances in Physical, Social {\&} Occupational Ergonomics - Proceedings
                  of the {AHFE} 2021 Virtual Conferences on Physical Ergonomics and
                  Human Factors, Social {\&} Occupational Ergonomics, and Cross-Cultural
                  Decision Making, July 25-29, 2021, {USA}},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {273},
  pages        = {236--243},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-80713-9\_31},
  doi          = {10.1007/978-3-030-80713-9\_31},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ahfe/OravecHSSG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiam/LinYPB21,
  author       = {Hongzhen Lin and
                  Zhipan Yu and
                  Shiqi Peng and
                  Bo Bian},
  title        = {Security Issues in Commercial Application of Artificial Intelligence},
  booktitle    = {{AIAM} 2021: 3rd International Conference on Artificial Intelligence
                  and Advanced Manufacture, Manchester, United Kingdom, October 23 -
                  25, 2021},
  pages        = {1174--1177},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3495018.3495359},
  doi          = {10.1145/3495018.3495359},
  timestamp    = {Thu, 24 Mar 2022 09:42:53 +0100},
  biburl       = {https://dblp.org/rec/conf/aiam/LinYPB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiam/WanX21,
  author       = {Biao Wan and
                  Chunmei Xu},
  title        = {Application Analysis of Computer Software Security Vulnerability Detection
                  Based on Web Crawler},
  booktitle    = {{AIAM} 2021: 3rd International Conference on Artificial Intelligence
                  and Advanced Manufacture, Manchester, United Kingdom, October 23 -
                  25, 2021},
  pages        = {1969--1973},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3495018.3495526},
  doi          = {10.1145/3495018.3495526},
  timestamp    = {Thu, 24 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aiam/WanX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/SanoS0K21,
  author       = {Ayane Sano and
                  Yukiko Sawaya and
                  Akira Yamada and
                  Ayumu Kubota},
  editor       = {Leonard Barolli and
                  Isaac Woungang and
                  Tomoya Enokido},
  title        = {SeBeST: Security Behavior Stage Model and Its Application to {OS}
                  Update},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 35th International Conference on Advanced Information Networking
                  and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021,
                  Volume 2},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {226},
  pages        = {552--566},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75075-6\_45},
  doi          = {10.1007/978-3-030-75075-6\_45},
  timestamp    = {Thu, 12 Aug 2021 13:39:18 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/SanoS0K21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/AlnsourJ21,
  author       = {Yazan Alnsour and
                  Ahmad H. Juma'h},
  editor       = {Yolande E. Chan and
                  Maric Boudreau and
                  Benoit Aubert and
                  Guy Par{\'{e}} and
                  Wynne Chin},
  title        = {Exploring the Effects of Information Security {\&} Privacy on
                  Blockchain Mobile Applications Rating: Text Analytics Approach},
  booktitle    = {27th Americas Conference on Information Systems, {AMCIS} 2021, Virtual
                  Conference, August 9-13, 2021},
  publisher    = {Association for Information Systems},
  year         = {2021},
  url          = {https://aisel.aisnet.org/amcis2021/sig\_acctinfosystem\_asys/sig\_acctinfosystem\_asys/3},
  timestamp    = {Mon, 05 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/AlnsourJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apwcs2/MuqtadirBQBNH21,
  author       = {Muhammad Muqtadir and
                  M. Haris Butt and
                  Daniyal Qazi and
                  Faran Awais Butt and
                  Ijaz Haider Naqvi and
                  Naveed Ul Hassan},
  title        = {Health Secure Radar: Use of Micro Doppler Signatures for Health Care
                  and Security Applications},
  booktitle    = {2021 {IEEE} {VTS} 17th Asia Pacific Wireless Communications Symposium
                  (APWCS), Osaka, Japan, August 30-31, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/APWCS50173.2021.9548761},
  doi          = {10.1109/APWCS50173.2021.9548761},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apwcs2/MuqtadirBQBNH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Zhandry21,
  author       = {Mark Zhandry},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Redeeming Reset Indifferentiability and Applications to Post-quantum
                  Security},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13090},
  pages        = {518--548},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92062-3\_18},
  doi          = {10.1007/978-3-030-92062-3\_18},
  timestamp    = {Mon, 28 Aug 2023 21:17:52 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Zhandry21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bcca/PiriouBDPG21,
  author       = {Pierre{-}Yves Piriou and
                  Olivier Boudeville and
                  Gilles Deleuze and
                  Sara {Tucci Piergiovanni} and
                  {\"{O}}nder G{\"{u}}rcan},
  title        = {Justifying the Dependability and Security of Business-Critical Blockchain-based
                  Applications},
  booktitle    = {Third International Conference on Blockchain Computing and Applications,
                  {BCCA} 2021, Tartu, Estonia, November 15-17, 2021},
  pages        = {97--104},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BCCA53669.2021.9656962},
  doi          = {10.1109/BCCA53669.2021.9656962},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bcca/PiriouBDPG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bic/Fang21,
  author       = {Guo Fang},
  title        = {Application of Data Encryption Technology in Computer Network Security},
  booktitle    = {{BIC} 2021: International Conference on Bioinformatics and Intelligent
                  Computing, Harbin, China, January, 2021},
  pages        = {220--225},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448748.3448783},
  doi          = {10.1145/3448748.3448783},
  timestamp    = {Wed, 22 Jun 2022 15:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/bic/Fang21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/ImtiazSV21,
  author       = {Sayem Mohammad Imtiaz and
                  Kazi Zakia Sultana and
                  Aparna S. Varde},
  editor       = {Yixin Chen and
                  Heiko Ludwig and
                  Yicheng Tu and
                  Usama M. Fayyad and
                  Xingquan Zhu and
                  Xiaohua Hu and
                  Suren Byna and
                  Xiong Liu and
                  Jianping Zhang and
                  Shirui Pan and
                  Vagelis Papalexakis and
                  Jianwu Wang and
                  Alfredo Cuzzocrea and
                  Carlos Ordonez},
  title        = {Mining Learner-friendly Security Patterns from Huge Published Histories
                  of Software Applications for an Intelligent Tutoring System in Secure
                  Coding},
  booktitle    = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando,
                  FL, USA, December 15-18, 2021},
  pages        = {4869--4876},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigData52589.2021.9671757},
  doi          = {10.1109/BIGDATA52589.2021.9671757},
  timestamp    = {Fri, 13 Jan 2023 17:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/ImtiazSV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/KhanN21,
  author       = {Zulfiqar Ali Khan and
                  Akbar Siami Namin},
  editor       = {Yixin Chen and
                  Heiko Ludwig and
                  Yicheng Tu and
                  Usama M. Fayyad and
                  Xingquan Zhu and
                  Xiaohua Hu and
                  Suren Byna and
                  Xiong Liu and
                  Jianping Zhang and
                  Shirui Pan and
                  Vagelis Papalexakis and
                  Jianwu Wang and
                  Alfredo Cuzzocrea and
                  Carlos Ordonez},
  title        = {The Applications of Blockchains in Addressing the Integration and
                  Security of IoT Systems: {A} Survey},
  booktitle    = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando,
                  FL, USA, December 15-18, 2021},
  pages        = {2421--2426},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigData52589.2021.9671299},
  doi          = {10.1109/BIGDATA52589.2021.9671299},
  timestamp    = {Tue, 18 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/KhanN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bpm/0001M21,
  author       = {Mubashar Iqbal and
                  Raimundas Matulevicius},
  editor       = {Jos{\'{e}} Gonz{\'{a}}lez Enr{\'{\i}}quez and
                  S{\o}ren Debois and
                  Peter Fettke and
                  Pierluigi Plebani and
                  Inge van de Weerd and
                  Ingo Weber},
  title        = {Blockchain as a Countermeasure Solution for Security Threats of Healthcare
                  Applications},
  booktitle    = {Business Process Management: Blockchain and Robotic Process Automation
                  Forum - {BPM} 2021 Blockchain and {RPA} Forum, Rome, Italy, September
                  6-10, 2021, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {428},
  pages        = {67--84},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85867-4\_6},
  doi          = {10.1007/978-3-030-85867-4\_6},
  timestamp    = {Wed, 28 Dec 2022 15:36:22 +0100},
  biburl       = {https://dblp.org/rec/conf/bpm/0001M21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cacre/JiaLSW21,
  author       = {Xianfeng Jia and
                  Tianyu Liu and
                  Chunhui Sun and
                  Zhi Wu},
  editor       = {Fumin Zhang and
                  Ying Zhao},
  title        = {Analysis on the Application of Cryptographic Technology in the Communication
                  Security of Intelligent Networked Vehicles},
  booktitle    = {6th International Conference on Automation, Control and Robotics Engineering,
                  {CACRE} 2021, Dalian, China, July 15-17, 2021},
  pages        = {423--427},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CACRE52464.2021.9501303},
  doi          = {10.1109/CACRE52464.2021.9501303},
  timestamp    = {Fri, 13 Aug 2021 09:38:15 +0200},
  biburl       = {https://dblp.org/rec/conf/cacre/JiaLSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HanWCZWZYSY21,
  author       = {Dongqi Han and
                  Zhiliang Wang and
                  Wenqi Chen and
                  Ying Zhong and
                  Su Wang and
                  Han Zhang and
                  Jiahai Yang and
                  Xingang Shi and
                  Xia Yin},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection
                  in Security Applications},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {3197--3217},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484589},
  doi          = {10.1145/3460120.3484589},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HanWCZWZYSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/clei/BetarteCDEGMMM21,
  author       = {Gustavo Betarte and
                  Juan Diego Campo and
                  Andrea Delgado and
                  Pablo Ezzatti and
                  Laura Gonz{\'{a}}lez and
                  {\'{A}}lvaro Mart{\'{\i}}n and
                  Rodrigo Mart{\'{\i}}nez and
                  B{\'{a}}rbara Muracciole},
  title        = {Proximity tracing applications for {COVID-19:} data privacy and security},
  booktitle    = {{XLVII} Latin American Computing Conference, {CLEI} 2021, Cartago,
                  Costa Rica, October 25-29, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CLEI53233.2021.9640202},
  doi          = {10.1109/CLEI53233.2021.9640202},
  timestamp    = {Fri, 30 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/clei/BetarteCDEGMMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/clei/BrunoITCB21,
  author       = {Marcelo Bruno and
                  Pablo Ib{\'{a}}{\~{n}}ez and
                  Tamara Techera and
                  Daniel Calegari and
                  Gustavo Betarte},
  title        = {Exploring the Application of Process Mining Techniques to Improve
                  Web Application Security},
  booktitle    = {{XLVII} Latin American Computing Conference, {CLEI} 2021, Cartago,
                  Costa Rica, October 25-29, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CLEI53233.2021.9640192},
  doi          = {10.1109/CLEI53233.2021.9640192},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/clei/BrunoITCB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/GranataRS21,
  author       = {Daniele Granata and
                  Massimiliano Rak and
                  Giovanni Salzillo},
  editor       = {Donald Ferguson and
                  Markus Helfert and
                  Claus Pahl},
  title        = {Risk Analysis Automation Process in {IT} Security for Cloud Applications},
  booktitle    = {Cloud Computing and Services Science - 11th International Conference,
                  {CLOSER} 2021, Virtual Event, April 28-30, 2021, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1607},
  pages        = {47--68},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-21637-4\_3},
  doi          = {10.1007/978-3-031-21637-4\_3},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/closer/GranataRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cncert/Wang21,
  author       = {Zhanyu Wang},
  editor       = {Wei Lu and
                  Yuqing Zhang and
                  Weiping Wen and
                  Hanbing Yan and
                  Chao Li},
  title        = {Research and Application of Security Situation Awareness Platform
                  for Large Enterprises},
  booktitle    = {Cyber Security - 18th China Annual Conference, {CNCERT} 2021, Beijing,
                  China, July 20-21, 2021, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1506},
  pages        = {129--139},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-9229-1\_8},
  doi          = {10.1007/978-981-16-9229-1\_8},
  timestamp    = {Thu, 15 Dec 2022 13:09:15 +0100},
  biburl       = {https://dblp.org/rec/conf/cncert/Wang21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HoglundR21,
  author       = {Joel H{\"{o}}glund and
                  Shahid Raza},
  title        = {{LICE:} Lightweight certificate enrollment for IoT using application
                  layer security},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {19--28},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705036},
  doi          = {10.1109/CNS53000.2021.9705036},
  timestamp    = {Fri, 18 Feb 2022 10:36:40 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/HoglundR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/MinkevicsK21,
  author       = {Vladislavs Minkevics and
                  Janis Kampars},
  editor       = {Prosper Chemouil and
                  Mehmet Ulema and
                  Stuart Clayman and
                  M{\"{u}}ge Sayit and
                  Cihat {\c{C}}etinkaya and
                  Stefano Secci},
  title        = {Artificial intelligence and big data driven {IS} security management
                  solution with applications in higher education organizations},
  booktitle    = {17th International Conference on Network and Service Management, {CNSM}
                  2021, Izmir, Turkey, October 25-29, 2021},
  pages        = {340--344},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/CNSM52442.2021.9615575},
  doi          = {10.23919/CNSM52442.2021.9615575},
  timestamp    = {Sun, 02 Oct 2022 15:57:41 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsm/MinkevicsK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/HuWTXXLL21,
  author       = {Yiwen Hu and
                  Sihan Wang and
                  Guan{-}Hua Tu and
                  Li Xiao and
                  Tian Xie and
                  Xinyu Lei and
                  Chi{-}Yu Li},
  editor       = {Anupam Joshi and
                  Barbara Carminati and
                  Rakesh M. Verma},
  title        = {Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities,
                  Attacks, and Countermeasures},
  booktitle    = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security
                  and Privacy, Virtual Event, USA, April 26-28, 2021},
  pages        = {89--100},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422337.3447832},
  doi          = {10.1145/3422337.3447832},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/HuWTXXLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TakefusaSFYAP21,
  author       = {Atsuko Takefusa and
                  Jingtao Sun and
                  Ikki Fujiwara and
                  Hiroshi Yoshida and
                  Kento Aida and
                  Calton Pu},
  title        = {SINETStream: Enabling Research IoT Applications with Portability,
                  Security and Performance Requirements},
  booktitle    = {{IEEE} 45th Annual Computers, Software, and Applications Conference,
                  {COMPSAC} 2021, Madrid, Spain, July 12-16, 2021},
  pages        = {482--492},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/COMPSAC51774.2021.00073},
  doi          = {10.1109/COMPSAC51774.2021.00073},
  timestamp    = {Thu, 23 Sep 2021 08:33:11 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/TakefusaSFYAP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/UdvarhelyiBS21,
  author       = {Balazs Udvarhelyi and
                  Olivier Bronchain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Shivam Bhasin and
                  Fabrizio De Santis},
  title        = {Security Analysis of Deterministic Re-keying with Masking and Shuffling:
                  Application to {ISAP}},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 12th International
                  Workshop, {COSADE} 2021, Lugano, Switzerland, October 25-27, 2021,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12910},
  pages        = {168--183},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89915-8\_8},
  doi          = {10.1007/978-3-030-89915-8\_8},
  timestamp    = {Fri, 29 Oct 2021 16:42:34 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/UdvarhelyiBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpits/BerestovKSKO21,
  author       = {Denis Berestov and
                  Oleg Kurchenko and
                  Yuri Shcheblanin and
                  Nataliia Korshun and
                  Tetiana S. Opryshko},
  editor       = {Volodymyr Buriachok and
                  Dmytro Ageyev and
                  Valeriy Lahno and
                  Volodymyr Sokolov},
  title        = {Analysis of Features and Prospects of Application of Dynamic Iterative
                  Assessment of Information Security Risks (short paper)},
  booktitle    = {Paper Proceedings of the Selected Papers on Publishing Papers with
                  {CEUR-WS} co-located with Workshop on Cybersecurity Providing in Information
                  and Telecommunication Systems {(CPITS} 2021), Kyiv, Ukraine, January
                  28, 2021 (online)},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2923},
  pages        = {329--335},
  publisher    = {CEUR-WS.org},
  year         = {2021},
  url          = {https://ceur-ws.org/Vol-2923/paper36.pdf},
  timestamp    = {Sun, 24 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cpits/BerestovKSKO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csci/Rahimi21,
  author       = {Nick Rahimi},
  title        = {A Study of the Landscape of Security Issues, Vulnerabilities, and
                  Defense Mechanisms in Web Based Applications},
  booktitle    = {International Conference on Computational Science and Computational
                  Intelligence, {CSCI} 2021, Las Vegas, NV, USA, December 15-17, 2021},
  pages        = {806--811},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSCI54926.2021.00194},
  doi          = {10.1109/CSCI54926.2021.00194},
  timestamp    = {Tue, 23 Apr 2024 12:44:18 +0200},
  biburl       = {https://dblp.org/rec/conf/csci/Rahimi21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/FengCEH21,
  author       = {Xiaohua Feng and
                  Marc Conrad and
                  Elias Eze and
                  Khalid Hussein},
  title        = {Artificial Intelligence and Blockchain for Future Cyber Security Application},
  booktitle    = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl
                  Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and
                  Big Data Computing, Intl Conf on Cyber Science and Technology Congress,
                  DASC/PiCom/CBDCom/CyberSciTech 2021, Canada, October 25-28, 2021},
  pages        = {802--805},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00133},
  doi          = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH52372.2021.00133},
  timestamp    = {Wed, 23 Mar 2022 17:30:18 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/FengCEH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/ClaesenSVM21,
  author       = {Thomas Claesen and
                  Arish Sateesan and
                  Jo Vliegen and
                  Nele Mentens},
  editor       = {Francesco Leporati and
                  Salvatore Vitabile and
                  Amund Skavhaug},
  title        = {Novel Non-cryptographic Hash Functions for Networking and Security
                  Applications on {FPGA}},
  booktitle    = {24th Euromicro Conference on Digital System Design, {DSD} 2021, Virtual
                  Event / Palermo, Sicily, Italy, September 1-3, 2021},
  pages        = {347--354},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSD53832.2021.00059},
  doi          = {10.1109/DSD53832.2021.00059},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsd/ClaesenSVM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LuL21,
  author       = {Xiaofeng Lu and
                  Pietro Li{\`{o}}},
  title        = {International Workshop On Application of Intelligent Technology in
                  Security - {AITS} 2021},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks Workshops, {DSN} Workshops 2021, Taipei, Taiwan, June
                  21-24, 2021},
  pages        = {xiv--xv},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN-W52860.2021.00008},
  doi          = {10.1109/DSN-W52860.2021.00008},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LuL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/TebibAAG21,
  author       = {Mohammed El Amin Tebib and
                  Pascal Andr{\'{e}} and
                  Oum{-}El{-}Kheir Aktouf and
                  Mariem Graa},
  editor       = {Rasmus Adler and
                  Amel Bennaceur and
                  Simon Burton and
                  Amleto Di Salle and
                  Nicola Nostro and
                  Rasmus L{\o}venstein Olsen and
                  Selma Saidi and
                  Philipp Schleiss and
                  Daniel Schneider and
                  Hans{-}Peter Schwefel},
  title        = {Assisting Developers in Preventing Permissions Related Security Issues
                  in Android Applications},
  booktitle    = {Dependable Computing - {EDCC} 2021 Workshops - DREAMS, DSOGRI, {SERENE}
                  2021, Munich, Germany, September 13, 2021, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1462},
  pages        = {132--143},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86507-8\_13},
  doi          = {10.1007/978-3-030-86507-8\_13},
  timestamp    = {Sun, 25 Dec 2022 19:02:10 +0100},
  biburl       = {https://dblp.org/rec/conf/edcc/TebibAAG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emcis/TannerS21,
  author       = {Maureen Tanner and
                  Sujala Singh},
  editor       = {Marinos Themistocleous and
                  Maria Papadaki},
  title        = {The Influence of Locus of Control in the Actualisation of Mobile Dating
                  Applications Affordances to Mitigate Privacy and Security Concerns},
  booktitle    = {Information Systems - 18th European, Mediterranean, and Middle Eastern
                  Conference, {EMCIS} 2021, Virtual Event, December 8-9, 2021, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {437},
  pages        = {333--345},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95947-0\_23},
  doi          = {10.1007/978-3-030-95947-0\_23},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/emcis/TannerS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esem/CroftNCB21,
  author       = {Roland Croft and
                  Dominic Newlands and
                  Ziyu Chen and
                  Muhammad Ali Babar},
  editor       = {Filippo Lanubile and
                  Marcos Kalinowski and
                  Maria Teresa Baldassarre},
  title        = {An Empirical Study of Rule-Based and Learning-Based Approaches for
                  Static Application Security Testing},
  booktitle    = {{ESEM} '21: {ACM} / {IEEE} International Symposium on Empirical Software
                  Engineering and Measurement, Bari, Italy, October 11-15, 2021},
  pages        = {8:1--8:12},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3475716.3475781},
  doi          = {10.1145/3475716.3475781},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esem/CroftNCB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Mann21,
  author       = {Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  editor       = {Sokratis K. Katsikas and
                  Costas Lambrinoudakis and
                  Nora Cuppens and
                  John Mylopoulos and
                  Christos Kalloniatis and
                  Weizhi Meng and
                  Steven Furnell and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Jorge Maestre Vidal and
                  Marco Antonio Sotelo Monge},
  title        = {Security- and Privacy-Aware IoT Application Placement and User Assignment},
  booktitle    = {Computer Security. {ESORICS} 2021 International Workshops - CyberICPS,
                  SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT{\&}SECOMANE, Darmstadt,
                  Germany, October 4-8, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13106},
  pages        = {296--316},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95484-0\_18},
  doi          = {10.1007/978-3-030-95484-0\_18},
  timestamp    = {Wed, 09 Nov 2022 13:58:44 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/Mann21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etfa/KhanSS21,
  author       = {Muhammad Taimoor Khan and
                  Dimitrios Serpanos and
                  Howard E. Shrobe},
  title        = {Towards Scalable Security of Real-time Applications: {A} Formally
                  Certified Approach},
  booktitle    = {26th {IEEE} International Conference on Emerging Technologies and
                  Factory Automation, {ETFA} 2021, Vasteras, Sweden, September 7-10,
                  2021},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ETFA45728.2021.9613489},
  doi          = {10.1109/ETFA45728.2021.9613489},
  timestamp    = {Tue, 07 Dec 2021 09:17:59 +0100},
  biburl       = {https://dblp.org/rec/conf/etfa/KhanSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucnc/StavroulakiSCCM21,
  author       = {Vera Stavroulaki and
                  Emilio Calvanese Strinati and
                  Fran{\c{c}}ois Carrez and
                  Yannick Carlinet and
                  Mickael Maman and
                  Drasko Draskovic and
                  Drazen Ribar and
                  Arthur Lallet and
                  Klaus M{\"{o}}{\ss}ner and
                  Milenko Tosic and
                  Mikko Uitto and
                  Seilendria A. Hadiwardoyo and
                  Johann M{\'{a}}rquez{-}Barja and
                  Esther Garrido and
                  Makis Stamatelatos and
                  Khaled Sarayeddine and
                  Pablo S{\'{a}}nchez Vivas and
                  Aarne M{\"{a}}mmel{\"{a}} and
                  Panagiotis Demestichas},
  title        = {{DEDICAT} 6G - Dynamic Coverage Extension and Distributed Intelligence
                  for Human Centric Applications with Assured Security, Privacy and
                  Trust: from 5G to 6G},
  booktitle    = {Joint European Conference on Networks and Communications {\&}
                  6G Summit, EuCNC/6G Summit 2021, Porto, Portugal, June 8-11, 2021},
  pages        = {556--561},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuCNC/6GSummit51104.2021.9482611},
  doi          = {10.1109/EUCNC/6GSUMMIT51104.2021.9482611},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eucnc/StavroulakiSCCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LaiLW21,
  author       = {Qiqi Lai and
                  Feng{-}Hao Liu and
                  Zhedong Wang},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {New Lattice Two-Stage Sampling Technique and Its Applications to Functional
                  Encryption - Stronger Security and Smaller Ciphertexts},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12696},
  pages        = {498--527},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77870-5\_18},
  doi          = {10.1007/978-3-030-77870-5\_18},
  timestamp    = {Wed, 16 Jun 2021 11:49:32 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LaiLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fccm/GandhamSL21,
  author       = {Sanjay Gandham and
                  Rakin Muhammad Shadab and
                  Mingjie Lin},
  title        = {{ARC:} Reconfigurable Cache Security Assurance with Application-Specific
                  Randomized Mapping in FPGA-Based Heterogeneous Computing},
  booktitle    = {29th {IEEE} Annual International Symposium on Field-Programmable Custom
                  Computing Machines, {FCCM} 2021, Orlando, FL, USA, May 9-12, 2021},
  pages        = {255},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/FCCM51124.2021.00042},
  doi          = {10.1109/FCCM51124.2021.00042},
  timestamp    = {Mon, 07 Jun 2021 17:13:01 +0200},
  biburl       = {https://dblp.org/rec/conf/fccm/GandhamSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdse/TranNPT21,
  author       = {Anh{-}Duy Tran and
                  Minh{-}Quan Nguyen and
                  Gia{-}Hao Phan and
                  Minh{-}Triet Tran},
  editor       = {Tran Khanh Dang and
                  Josef K{\"{u}}ng and
                  Tai M. Chung and
                  Makoto Takizawa},
  title        = {Security Issues in Android Application Development and Plug-in for
                  Android Studio to Support Secure Programming},
  booktitle    = {Future Data and Security Engineering. Big Data, Security and Privacy,
                  Smart City and Industry 4.0 Applications - 8th International Conference,
                  {FDSE} 2021, Virtual Event, November 24-26, 2021, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1500},
  pages        = {105--122},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-8062-5\_7},
  doi          = {10.1007/978-981-16-8062-5\_7},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdse/TranNPT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fnc/Pal21,
  author       = {Kamalendu Pal},
  editor       = {Elhadi M. Shakshuki and
                  Ansar{-}Ul{-}Haque Yasar},
  title        = {Privacy, Security and Policies: {A} Review of Problems and Solutions
                  with Blockchain-Based Internet of Things Applications in Manufacturing
                  Industry},
  booktitle    = {The 18th International Conference on Mobile Systems and Pervasive
                  Computing (MobiSPC 2021) / The 16th International Conference on Future
                  Networks and Communications {(FNC-2021)} / The 11th International
                  Conference on Sustainable Energy Information Technology, Leuven, Belgium,
                  August 9-12, 2021},
  series       = {Procedia Computer Science},
  volume       = {191},
  pages        = {176--183},
  publisher    = {Elsevier},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.procs.2021.07.022},
  doi          = {10.1016/J.PROCS.2021.07.022},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fnc/Pal21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fnc/TariqKA21,
  author       = {Noshina Tariq and
                  Farrukh Aslam Khan and
                  Muhammad Asim},
  editor       = {Elhadi M. Shakshuki and
                  Ansar{-}Ul{-}Haque Yasar},
  title        = {Security Challenges and Requirements for Smart Internet of Things
                  Applications: {A} Comprehensive Analysis},
  booktitle    = {The 18th International Conference on Mobile Systems and Pervasive
                  Computing (MobiSPC 2021) / The 16th International Conference on Future
                  Networks and Communications {(FNC-2021)} / The 11th International
                  Conference on Sustainable Energy Information Technology, Leuven, Belgium,
                  August 9-12, 2021},
  series       = {Procedia Computer Science},
  volume       = {191},
  pages        = {425--430},
  publisher    = {Elsevier},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.procs.2021.07.053},
  doi          = {10.1016/J.PROCS.2021.07.053},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fnc/TariqKA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcaiot/ZingirianS21,
  author       = {Nicola Zingirian and
                  Girolamo Marco Salierno},
  title        = {IoT Application for the Physical Security in Gas Transportation},
  booktitle    = {{IEEE} Global Conference on Artificial Intelligence and Internet of
                  Things, GCAIoT 2021, Dubai, United Arab Emirates, December 12-16,
                  2021},
  pages        = {122--129},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/GCAIoT53516.2021.9692917},
  doi          = {10.1109/GCAIOT53516.2021.9692917},
  timestamp    = {Fri, 18 Feb 2022 10:36:45 +0100},
  biburl       = {https://dblp.org/rec/conf/gcaiot/ZingirianS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/AbdulgadirLFKG21,
  author       = {Abubakr Abdulgadir and
                  Sammy Lin and
                  Farnoud Farahmand and
                  Jens{-}Peter Kaps and
                  Kris Gaj},
  editor       = {Yiran Chen and
                  Victor V. Zhirnov and
                  Avesta Sasan and
                  Ioannis Savidis},
  title        = {Side-channel Resistant Implementations of a Novel Lightweight Authenticated
                  Cipher with Application to Hardware Security},
  booktitle    = {{GLSVLSI} '21: Great Lakes Symposium on {VLSI} 2021, Virtual Event,
                  USA, June 22-25, 2021},
  pages        = {229--234},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3453688.3461761},
  doi          = {10.1145/3453688.3461761},
  timestamp    = {Mon, 04 Jul 2022 14:19:34 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/AbdulgadirLFKG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/Orlando21,
  author       = {Pompei Len Orlando},
  editor       = {Yiran Chen and
                  Victor V. Zhirnov and
                  Avesta Sasan and
                  Ioannis Savidis},
  title        = {An Air Force Perspective on the Application of Machine Learning for
                  Microelectronics Design and Security},
  booktitle    = {{GLSVLSI} '21: Great Lakes Symposium on {VLSI} 2021, Virtual Event,
                  USA, June 22-25, 2021},
  pages        = {319},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3453688.3462233},
  doi          = {10.1145/3453688.3462233},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/Orlando21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/IslamC21,
  author       = {Muhammad Usama Islam and
                  Beenish M. Chaudhry},
  editor       = {Constantine Stephanidis and
                  Margherita Antona and
                  Stavroula Ntoa},
  title        = {DoAR: An Augmented Reality Based Door Security Prototype Application},
  booktitle    = {{HCI} International 2021 - Late Breaking Posters - 23rd {HCI} International
                  Conference, {HCII} 2021, Virtual Event, July 24-29, 2021, Proceedings,
                  Part {I}},
  series       = {Communications in Computer and Information Science},
  volume       = {1498},
  pages        = {126--134},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90176-9\_18},
  doi          = {10.1007/978-3-030-90176-9\_18},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hci/IslamC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/SchaferKS21,
  author       = {Gertraud Sch{\"{a}}fer and
                  Andreas Kreisel and
                  Ulrike Stopka},
  editor       = {Heidi Kr{\"{o}}mker},
  title        = {Usability Study of an Innovative Application in Public Transport by
                  Using Hardware-Based Security Technology},
  booktitle    = {{HCI} in Mobility, Transport, and Automotive Systems - Third International
                  Conference, MobiTAS 2021, Held as Part of the 23rd {HCI} International
                  Conference, {HCII} 2021, Virtual Event, July 24-29, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12791},
  pages        = {105--125},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78358-7\_7},
  doi          = {10.1007/978-3-030-78358-7\_7},
  timestamp    = {Tue, 20 Jul 2021 15:09:55 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/SchaferKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/ShenCCZZZ21,
  author       = {Yufan Shen and
                  Kun Cao and
                  Yangguang Cui and
                  Chengliang Zhou and
                  Gongxuan Zhang and
                  Junlong Zhou},
  title        = {Lifetime-Driven Scheduling of Security-Critical Internet-of-Things
                  Applications on Real-Time Heterogeneous Multicore Systems},
  booktitle    = {2021 {IEEE} 23rd Int Conf on High Performance Computing {\&} Communications;
                  7th Int Conf on Data Science {\&} Systems; 19th Int Conf on Smart
                  City; 7th Int Conf on Dependability in Sensor, Cloud {\&} Big
                  Data Systems {\&} Application (HPCC/DSS/SmartCity/DependSys),
                  Haikou, Hainan, China, December 20-22, 2021},
  pages        = {1466--1474},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00219},
  doi          = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS53884.2021.00219},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpcc/ShenCCZZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/GoffinetSZLR21,
  author       = {Stanley Goffinet and
                  Donatien Schmitz and
                  Igor Zavalyshyn and
                  Axel Legay and
                  Etienne Rivi{\`{e}}re},
  editor       = {Afsaneh Doryab and
                  Qin Lv and
                  Michael Beigl},
  title        = {Controlling Security Rules Using Natural Dialogue: an Application
                  to Smart Home Care},
  booktitle    = {UbiComp/ISWC '21: 2021 {ACM} International Joint Conference on Pervasive
                  and Ubiquitous Computing and 2021 {ACM} International Symposium on
                  Wearable Computers, Virtual Event, September 21-25, 2021},
  pages        = {194--197},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460418.3479331},
  doi          = {10.1145/3460418.3479331},
  timestamp    = {Wed, 15 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/GoffinetSZLR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i2mtc/UllahSKW21,
  author       = {Abdul Wahab Usman Ullah and
                  Jawad Ali Shah and
                  Kushsairy Abdul Kadir and
                  Abdul Wahid},
  title        = {Development of Smart Surveillance System using Cloud for Security
                  Application},
  booktitle    = {{IEEE} International Instrumentation and Measurement Technology Conference,
                  {I2MTC} 2021, Glasgow, United Kingdom, May 17-20, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/I2MTC50364.2021.9459817},
  doi          = {10.1109/I2MTC50364.2021.9459817},
  timestamp    = {Tue, 06 Jul 2021 14:44:37 +0200},
  biburl       = {https://dblp.org/rec/conf/i2mtc/UllahSKW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3k/Thuraisingham21,
  author       = {Bhavani Thuraisingham},
  editor       = {Rita Cucchiara and
                  Ana L. N. Fred and
                  Joaquim Filipe},
  title        = {Integrating Big Data, Data Science and Cyber Security with Applications
                  in Cloud and Internet of Things},
  booktitle    = {Proceedings of the 13th International Joint Conference on Knowledge
                  Discovery, Knowledge Engineering and Knowledge Management, {IC3K}
                  2021, Volume 1: KDIR, Online Streaming, October 25-27, 2021},
  pages        = {7},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ic3k/Thuraisingham21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/AdibanSS21,
  author       = {Mohammad Adiban and
                  Arash Safari and
                  Giampiero Salvi},
  title        = {{STEP-GAN:} {A} One-Class Anomaly Detection Model with Applications
                  to Power System Security},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2021, Toronto, ON, Canada, June 6-11, 2021},
  pages        = {2605--2609},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICASSP39728.2021.9415102},
  doi          = {10.1109/ICASSP39728.2021.9415102},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/AdibanSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbds/ChenZT21,
  author       = {Yu Chen and
                  Ziqian Zhang and
                  Ning Tang},
  editor       = {Yuan Tian and
                  Tinghuai Ma and
                  Muhammad Khurram Khan and
                  Victor S. Sheng and
                  Zhaoqing Pan},
  title        = {Application of Digital Twin in the Security Protection of the Internet
                  of Things in Power System},
  booktitle    = {Big Data and Security - Third International Conference, {ICBDS} 2021,
                  Shenzhen, China, November 26-28, 2021, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1563},
  pages        = {218--229},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-19-0852-1\_17},
  doi          = {10.1007/978-981-19-0852-1\_17},
  timestamp    = {Fri, 08 Sep 2023 09:43:24 +0200},
  biburl       = {https://dblp.org/rec/conf/icbds/ChenZT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbds/YangMZ21,
  author       = {Yu{-}qing Yang and
                  Weiwei Miao and
                  Zeng Zeng},
  editor       = {Yuan Tian and
                  Tinghuai Ma and
                  Muhammad Khurram Khan and
                  Victor S. Sheng and
                  Zhaoqing Pan},
  title        = {The Application of Beidou and Ultra-Broadband Positioning Technology
                  in the Power Security Protection System},
  booktitle    = {Big Data and Security - Third International Conference, {ICBDS} 2021,
                  Shenzhen, China, November 26-28, 2021, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1563},
  pages        = {171--182},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-19-0852-1\_13},
  doi          = {10.1007/978-981-19-0852-1\_13},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icbds/YangMZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/JellenCF21,
  author       = {Isabel Jellen and
                  Joseph Callenes{-}Sloan and
                  Dongfeng Fang},
  title        = {Heterogeneous System Model for Security in E-Health Applications},
  booktitle    = {{IEEE} International Conference on Communications Workshops, {ICC}
                  Workshops 2021, Montreal, QC, Canada, June 14-23, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCWorkshops50388.2021.9473543},
  doi          = {10.1109/ICCWORKSHOPS50388.2021.9473543},
  timestamp    = {Tue, 13 Jul 2021 14:57:20 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/JellenCF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/GaikwadPK21,
  author       = {Bipin Gaikwad and
                  PVBSS Prakash and
                  Abhijit Karmakar},
  title        = {Edge-based real-time face logging system for security applications},
  booktitle    = {12th International Conference on Computing Communication and Networking
                  Technologies, {ICCCNT} 2021, Kharagpur, India, July 6-8, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCCNT51525.2021.9579758},
  doi          = {10.1109/ICCCNT51525.2021.9579758},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccnt/GaikwadPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/SheikhKDLJA21,
  author       = {Ayesha Sameer Sheikh and
                  Annem Keerthi and
                  Sateeshkrishna Dhuli and
                  Guntakala Likhita and
                  B. S. V. Naga Jahnavi and
                  Fouzul Atik},
  title        = {A Novel Security System for IoT Applications},
  booktitle    = {12th International Conference on Computing Communication and Networking
                  Technologies, {ICCCNT} 2021, Kharagpur, India, July 6-8, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCCNT51525.2021.9579502},
  doi          = {10.1109/ICCCNT51525.2021.9579502},
  timestamp    = {Thu, 25 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccnt/SheikhKDLJA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdh/MigiroSS21,
  author       = {Lorna Migiro and
                  Hossain Shahriar and
                  Sweta Sneha},
  title        = {Analyzing Security and Privacy Concerns of Contact Tracing Applications},
  booktitle    = {{IEEE} International Conference on Digital Health, {ICDH} 2021, Chicago,
                  IL, USA, September 5-10, 2021},
  pages        = {283--292},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICDH52753.2021.00052},
  doi          = {10.1109/ICDH52753.2021.00052},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdh/MigiroSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icebe/UrbanczykW21,
  author       = {Wojciech Urbanczyk and
                  Jan Werewka},
  title        = {Application of a Government Data Center {(GDC)} Reference Model for
                  Security Management Analysis},
  booktitle    = {{IEEE} International Conference on e-Business Engineering, {ICEBE}
                  2021, Guangzhou, China, November 12-14, 2021},
  pages        = {112--119},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICEBE52470.2021.00021},
  doi          = {10.1109/ICEBE52470.2021.00021},
  timestamp    = {Fri, 22 Apr 2022 19:18:39 +0200},
  biburl       = {https://dblp.org/rec/conf/icebe/UrbanczykW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/Schlegel21,
  author       = {Marius Schlegel},
  editor       = {Pierangela Samarati and
                  Marten van Sinderen and
                  Sabrina De Capitani di Vimercati and
                  Fons Wijnhoven},
  title        = {Trusted Implementation and Enforcement of Application Security Policies},
  booktitle    = {E-Business and Telecommunications - 18th International Conference,
                  {ICETE} 2021, Virtual Event, July 6-9, 2021, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1795},
  pages        = {362--388},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-36840-0\_16},
  doi          = {10.1007/978-3-031-36840-0\_16},
  timestamp    = {Tue, 07 May 2024 20:08:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/Schlegel21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciscae/SongC21,
  author       = {Yufei Song and
                  Mingde Chu},
  title        = {Research on the Application of Data Encryption Technology in Computer
                  Network Security Based on Machine Learning},
  booktitle    = {4th International Conference on Information Systems and Computer Aided
                  Education, {ICISCAE} 2021, Dalian, China, September 24-26, 2021},
  pages        = {399--403},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICISCAE52414.2021.9590794},
  doi          = {10.1109/ICISCAE52414.2021.9590794},
  timestamp    = {Thu, 02 Dec 2021 14:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/iciscae/SongC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/JacobQL21,
  author       = {Stephen Jacob and
                  Yuansong Qiao and
                  Brian Lee},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Detecting Cyber Security Attacks against a Microservices Application
                  using Distributed Tracing},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {588--595},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010308905880595},
  doi          = {10.5220/0010308905880595},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/JacobQL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcis/TomaCDFF21,
  author       = {Andrea Toma and
                  Niccol{\`{o}} Cecchinato and
                  Carlo Drioli and
                  Gian Luca Foresti and
                  Giovanni Ferrin},
  title        = {CNN-based processing of radio frequency signals for augmenting acoustic
                  source localization and enhancement in {UAV} security applications},
  booktitle    = {International Conference on Military Communication and Information
                  Systems, {ICMCIS} 2021, The Hague, The Netherlands, May 4-5, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICMCIS52405.2021.9486424},
  doi          = {10.1109/ICMCIS52405.2021.9486424},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcis/TomaCDFF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/ElderZKSMW21,
  author       = {Sarah Elder and
                  Nusrat Zahan and
                  Valeri Kozarev and
                  Rui Shu and
                  Tim Menzies and
                  Laurie A. Williams},
  title        = {Structuring a Comprehensive Software Security Course Around the {OWASP}
                  Application Security Verification Standard},
  booktitle    = {43rd {IEEE/ACM} International Conference on Software Engineering:
                  Software Engineering Education and Training, {ICSE} {(SEET)} 2021,
                  Madrid, Spain, May 25-28, 2021},
  pages        = {95--104},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICSE-SEET52601.2021.00019},
  doi          = {10.1109/ICSE-SEET52601.2021.00019},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/ElderZKSMW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icta3/XiFKGLZC21,
  author       = {Yifang Xi and
                  Xiaotong Fang and
                  Yachen Kong and
                  Yifan Guo and
                  Hongzhe Lin and
                  Xuepeng Zhan and
                  Jiezhi Chen},
  title        = {Bits Mapping in Triple-level-cell {(TLC)} Charge-trap {(CT)} 3D {NAND}
                  Flash Memory and its Applications to IoT Security},
  booktitle    = {2021 {IEEE} International Conference on Integrated Circuits, Technologies
                  and Applications, {ICTA} 2021, Zhuhai, China, November 24-26, 2021},
  pages        = {69--71},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICTA53157.2021.9661687},
  doi          = {10.1109/ICTA53157.2021.9661687},
  timestamp    = {Mon, 06 Nov 2023 08:19:56 +0100},
  biburl       = {https://dblp.org/rec/conf/icta3/XiFKGLZC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idaacs/KuznetsovK21a,
  author       = {Alexandr Kuznetsov and
                  Kateryna Kuznetsova},
  title        = {Comment on "Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes
                  Generation for Security Applications"},
  booktitle    = {2021 11th {IEEE} International Conference on Intelligent Data Acquisition
                  and Advanced Computing Systems: Technology and Applications (IDAACS),
                  Cracow, Poland, September 22-25, 2021},
  pages        = {485--488},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IDAACS53288.2021.9660983},
  doi          = {10.1109/IDAACS53288.2021.9660983},
  timestamp    = {Fri, 07 Jan 2022 10:36:47 +0100},
  biburl       = {https://dblp.org/rec/conf/idaacs/KuznetsovK21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iecon/MeyerHEK21,
  author       = {Dominik Meyer and
                  Jan Haase and
                  Marcel Eckert and
                  Bernd Klauer},
  title        = {A Modern Approach to Application Specific Processors for Improving
                  the Security of Embedded Devices},
  booktitle    = {{IECON} 2021 - 47th Annual Conference of the {IEEE} Industrial Electronics
                  Society, Toronto, ON, Canada, October 13-16, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IECON48115.2021.9589730},
  doi          = {10.1109/IECON48115.2021.9589730},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iecon/MeyerHEK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieeesec/ReuschP21,
  author       = {Niklas Reusch and
                  Paul Pop},
  title        = {Scheduling Real-Time Applications on Edge Computing Platforms with
                  Remote Attestation for Security},
  booktitle    = {6th {IEEE/ACM} Symposium on Edge Computing, {SEC} 2021, San Jose,
                  CA, USA, December 14-17, 2021},
  pages        = {403--408},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3453142.3493510},
  doi          = {10.1145/3453142.3493510},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ieeesec/ReuschP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifipiot/Zingirian21,
  author       = {Nicola Zingirian},
  editor       = {Luis M. Camarinha{-}Matos and
                  Geert Heijenk and
                  Srinivas Katkoori and
                  Leon Strous},
  title        = {Cyber-Physical Application for the Safety and Security Enforcement
                  in Oil and Gas Transportation},
  booktitle    = {Internet of Things. Technology and Applications - 4th {IFIP} International
                  Cross-Domain Conference, IFIPIoT 2021, Virtual Event, November 4-5,
                  2021, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {641},
  pages        = {180--196},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-96466-5\_12},
  doi          = {10.1007/978-3-030-96466-5\_12},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifipiot/Zingirian21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indin/ColelliFFPP21,
  author       = {Riccardo Colelli and
                  Chiara Foglietta and
                  Roberto Fusacchia and
                  Stefano Panzieri and
                  Federica Pascucci},
  title        = {Blockchain application in simulated environment for Cyber-Physical
                  Systems Security},
  booktitle    = {19th {IEEE} International Conference on Industrial Informatics, {INDIN}
                  2021, Palma de Mallorca, Spain, July 21-23, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/INDIN45523.2021.9557446},
  doi          = {10.1109/INDIN45523.2021.9557446},
  timestamp    = {Mon, 18 Oct 2021 17:08:58 +0200},
  biburl       = {https://dblp.org/rec/conf/indin/ColelliFFPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipaw/SchreiberSHKGP21,
  author       = {Andreas Schreiber and
                  Tim Sonnekalb and
                  Thomas S. Heinze and
                  Lynn von Kurnatowski and
                  Jes{\'{u}}s M. Gonz{\'{a}}lez{-}Barahona and
                  Heather S. Packer},
  editor       = {Boris Glavic and
                  Vanessa Braganholo and
                  David Koop},
  title        = {Provenance-Based Security Audits and Its Application to {COVID-19}
                  Contact Tracing Apps},
  booktitle    = {Provenance and Annotation of Data and Processes - 8th and 9th International
                  Provenance and Annotation Workshop, {IPAW} 2020 + {IPAW} 2021, Virtual
                  Event, July 19-22, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12839},
  pages        = {88--105},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-80960-7\_6},
  doi          = {10.1007/978-3-030-80960-7\_6},
  timestamp    = {Wed, 21 Jul 2021 15:51:06 +0200},
  biburl       = {https://dblp.org/rec/conf/ipaw/SchreiberSHKGP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SunKHP21,
  author       = {Ying Sun and
                  Qingchao Kong and
                  Luwen Huangfu and
                  Jin Pan},
  title        = {Domain-oriented News Recommendation in Security Applications},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISI53945.2021.9624817},
  doi          = {10.1109/ISI53945.2021.9624817},
  timestamp    = {Tue, 07 Dec 2021 17:02:14 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/SunKHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/TanCC21,
  author       = {Vincent Tan and
                  Carmen Cheh and
                  Binbin Chen},
  title        = {From Application Security Verification Standard {(ASVS)} to Regulation
                  Compliance: {A} Case Study in Financial Services Sector},
  booktitle    = {{IEEE} International Symposium on Software Reliability Engineering,
                  {ISSRE} 2021 - Workshops, Wuhan, China, October 25-28, 2021},
  pages        = {69--76},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISSREW53611.2021.00046},
  doi          = {10.1109/ISSREW53611.2021.00046},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/TanCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/NielsenTM21,
  author       = {Benjamin Barslev Nielsen and
                  Martin Toldam Torp and
                  Anders M{\o}ller},
  editor       = {Cristian Cadar and
                  Xiangyu Zhang},
  title        = {Modular call graph construction for security scanning of Node.js applications},
  booktitle    = {{ISSTA} '21: 30th {ACM} {SIGSOFT} International Symposium on Software
                  Testing and Analysis, Virtual Event, Denmark, July 11-17, 2021},
  pages        = {29--41},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460319.3464836},
  doi          = {10.1145/3460319.3464836},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/NielsenTM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/Rahkema21,
  author       = {Kristiina Rahkema},
  title        = {Quality analysis of mobile applications with special focus on security
                  aspects},
  booktitle    = {36th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2021, Melbourne, Australia, November 15-19, 2021},
  pages        = {1087--1089},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ASE51524.2021.9678681},
  doi          = {10.1109/ASE51524.2021.9678681},
  timestamp    = {Mon, 24 Jan 2022 16:18:34 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/Rahkema21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec2/TaoDHYQLM21,
  author       = {Haoran Tao and
                  Ning Ding and
                  Tianhui Huang and
                  Kehan Yu and
                  Dongsheng Qian and
                  Yan Luo and
                  Yuyin Ma},
  editor       = {Ilsun You and
                  Hwankuk Kim and
                  Taek{-}Young Youn and
                  Francesco Palmieri and
                  Igor V. Kotenko},
  title        = {Security Association Model: Interdisciplinary Application of 5G Positioning
                  Technology and Social Network},
  booktitle    = {Mobile Internet Security - 5th International Symposium, MobiSec 2021,
                  Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1544},
  pages        = {408--419},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-9576-6\_28},
  doi          = {10.1007/978-981-16-9576-6\_28},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisec2/TaoDHYQLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mwscas/TengbergF21,
  author       = {Tanner Tengberg and
                  Ayman A. Fayed},
  title        = {A Dual-Frequency Single-Inductor Single-Output {DC-DC} Converter Topology
                  with Spur-Free Switching for Security Applications},
  booktitle    = {64th {IEEE} International Midwest Symposium on Circuits and Systems,
                  {MWSCAS} 2021, Lansing, MI, USA, August 9-11, 2021},
  pages        = {974--977},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/MWSCAS47672.2021.9531746},
  doi          = {10.1109/MWSCAS47672.2021.9531746},
  timestamp    = {Sun, 03 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mwscas/TengbergF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Barradas00SRM21,
  author       = {Diogo Barradas and
                  Nuno Santos and
                  Lu{\'{\i}}s Rodrigues and
                  Salvatore Signorello and
                  Fernando M. V. Ramos and
                  Andr{\'{e}} Madeira},
  title        = {FlowLens: Enabling Efficient Flow Classification for ML-based Network
                  Security Applications},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/flowlens-enabling-efficient-flow-classification-for-ml-based-network-security-applications/},
  timestamp    = {Thu, 17 Jun 2021 15:42:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/Barradas00SRM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/HerbautCRM21,
  author       = {Nicolas Herbaut and
                  Camilo Correa and
                  Jacques Robin and
                  Ra{\'{u}}l Mazo},
  editor       = {Kohei Shiomoto and
                  Young{-}Tak Kim and
                  Christian Esteve Rothenberg and
                  Barbara Martini and
                  Eiji Oki and
                  Baek{-}Young Choi and
                  Noriaki Kamiyama and
                  Stefano Secci},
  title        = {{SDN} Intent-based conformance checking: application to security policies},
  booktitle    = {7th {IEEE} International Conference on Network Softwarization, NetSoft
                  2021, Tokyo, Japan, June 28 - July 2, 2021},
  pages        = {181--185},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/NetSoft51509.2021.9492679},
  doi          = {10.1109/NETSOFT51509.2021.9492679},
  timestamp    = {Mon, 02 Aug 2021 16:43:02 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/HerbautCRM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/McNieceLR21,
  author       = {Matthew R. McNiece and
                  Ruidan Li and
                  Bradley Reaves},
  editor       = {Oliver Hohlfeld and
                  Andra Lutu and
                  Dave Levin},
  title        = {Characterizing the Security of Endogenous and Exogenous Desktop Application
                  Network Flows},
  booktitle    = {Passive and Active Measurement - 22nd International Conference, {PAM}
                  2021, Virtual Event, March 29 - April 1, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12671},
  pages        = {531--546},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-72582-2\_31},
  doi          = {10.1007/978-3-030-72582-2\_31},
  timestamp    = {Tue, 30 Mar 2021 18:55:05 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/McNieceLR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/PaulLMR21,
  author       = {Pangkaj Chandra Paul and
                  John Loane and
                  Fergal McCaffery and
                  Gilbert Regan},
  title        = {A Data Security And Privacy Risk Management Framework For {WBAN} Based
                  Healthcare Applications},
  booktitle    = {19th {IEEE} International Conference on Pervasive Computing and Communications
                  Workshops and other Affiliated Events, PerCom Workshops 2021, Kassel,
                  Germany, March 22-26, 2021},
  pages        = {704--710},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/PerComWorkshops51409.2021.9431069},
  doi          = {10.1109/PERCOMWORKSHOPS51409.2021.9431069},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/percom/PaulLMR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/LudtkeKBS21,
  author       = {Steffen L{\"{u}}dtke and
                  Roman Kraus and
                  Ramon Barakat and
                  Martin A. Schneider},
  title        = {Attack-based Automation of Security Testing for IoT Applications with
                  Genetic Algorithms and Fuzzing},
  booktitle    = {21st {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2021 - Companion, Hainan, China, December 6-10,
                  2021},
  pages        = {92--100},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/QRS-C55045.2021.00023},
  doi          = {10.1109/QRS-C55045.2021.00023},
  timestamp    = {Tue, 12 Apr 2022 17:57:49 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/LudtkeKBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/Sasaki21,
  author       = {Ry{\^{o}}ichi Sasaki},
  title        = {Application of Risk Assessment Method to Local Government Security
                  Models},
  booktitle    = {21st {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2021 - Companion, Hainan, China, December 6-10,
                  2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/QRS-C55045.2021.00121},
  doi          = {10.1109/QRS-C55045.2021.00121},
  timestamp    = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/Sasaki21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rcar/HuZX021,
  author       = {Jia Hu and
                  Chuanshen Zhang and
                  Sheng Xu and
                  Chunjie Chen},
  title        = {An Invasive Target Detection and Localization Strategy Using Pan-Tilt-Zoom
                  Cameras for Security Applications},
  booktitle    = {{IEEE} International Conference on Real-time Computing and Robotics,
                  {RCAR} 2021, Xining, China, July 15-19, 2021},
  pages        = {1236--1241},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/RCAR52367.2021.9517521},
  doi          = {10.1109/RCAR52367.2021.9517521},
  timestamp    = {Thu, 23 Sep 2021 11:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/rcar/HuZX021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/roedunet/ContaselTP21,
  author       = {Cristian Contasel and
                  Dumitru{-}Cristian Tranca and
                  Alexandru{-}Viorel Palacean},
  title        = {Cloud based mobile application security enforcement using device attestation
                  {API}},
  booktitle    = {2021 20th RoEduNet Conference: Networking in Education and Research
                  (RoEduNet), Iasi, Romania, November 4-6, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/RoEduNet54112.2021.9638302},
  doi          = {10.1109/ROEDUNET54112.2021.9638302},
  timestamp    = {Thu, 16 Dec 2021 10:06:47 +0100},
  biburl       = {https://dblp.org/rec/conf/roedunet/ContaselTP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/roedunet/ZahariaSD21,
  author       = {Corneliu Zaharia and
                  Florin Sandu and
                  Gabriel Danciu},
  title        = {Adaptive Scaling for Image Sensors in Embedded Security Applications},
  booktitle    = {2021 20th RoEduNet Conference: Networking in Education and Research
                  (RoEduNet), Iasi, Romania, November 4-6, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/RoEduNet54112.2021.9638265},
  doi          = {10.1109/ROEDUNET54112.2021.9638265},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/roedunet/ZahariaSD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rtss/JiangLZJ21,
  author       = {Wei Jiang and
                  Xinke Liao and
                  Jinyu Zhan and
                  Ke Jiang},
  title        = {Work-in-Progress: Improving Resilience of Distributed Real-Time Applications
                  via Security and Fault Tolerance Co-Design},
  booktitle    = {42nd {IEEE} Real-Time Systems Symposium, {RTSS} 2021, Dortmund, Germany,
                  December 7-10, 2021},
  pages        = {536--539},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/RTSS52674.2021.00059},
  doi          = {10.1109/RTSS52674.2021.00059},
  timestamp    = {Mon, 25 Jul 2022 07:51:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rtss/JiangLZJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Schlegel21,
  author       = {Marius Schlegel},
  editor       = {Jorge Lobo and
                  Roberto Di Pietro and
                  Omar Chowdhury and
                  Hongxin Hu},
  title        = {Poster: Shielding AppSPEAR - Enhancing Memory Safety for Trusted Application-level
                  Security Policy Enforcement},
  booktitle    = {{SACMAT} '21: The 26th {ACM} Symposium on Access Control Models and
                  Technologies, Virtual Event, Spain, June 16-18, 2021},
  pages        = {99--101},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3450569.3464396},
  doi          = {10.1145/3450569.3464396},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/Schlegel21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/KloibhoferKE21,
  author       = {Reinhard Kloibhofer and
                  Erwin Kristen and
                  Afshin Ameri E},
  editor       = {Ibrahim Habli and
                  Mark Sujan and
                  Simos Gerasimou and
                  Erwin Schoitsch and
                  Friedemann Bitsch},
  title        = {LoRaWAN with {HSM} as a Security Improvement for Agriculture Applications
                  - Evaluation},
  booktitle    = {Computer Safety, Reliability, and Security. {SAFECOMP} 2021 Workshops
                  - DECSoS, MAPSOD, DepDevOps, USDAI, and WAISE, York, UK, September
                  7, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12853},
  pages        = {128--140},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-83906-2\_10},
  doi          = {10.1007/978-3-030-83906-2\_10},
  timestamp    = {Thu, 26 Aug 2021 14:31:10 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/KloibhoferKE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PernprunerSR21,
  author       = {Marco Pernpruner and
                  Giada Sciarretta and
                  Silvio Ranise},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Framework for Security and Risk Analysis of Enrollment Procedures:
                  Application to Fully-remote Solutions based on eDocuments},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {222--233},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010554502220233},
  doi          = {10.5220/0010554502220233},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PernprunerSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Schlegel21,
  author       = {Marius Schlegel},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Trusted Enforcement of Application-specific Security Policies},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {343--355},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010579703430355},
  doi          = {10.5220/0010579703430355},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Schlegel21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sera/JosephZE21,
  author       = {Ryan B. Joseph and
                  Minhaz F. Zibran and
                  Farjana Z. Eishita},
  title        = {Choosing the Weapon: {A} Comparative Study of Security Analyzers for
                  Android Applications},
  booktitle    = {19th {IEEE/ACIS} International Conference on Software Engineering
                  Research, Management and Applications, {SERA} 2021, Kanazawa, Japan,
                  June 20-22, 2021},
  pages        = {51--57},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SERA51205.2021.9509271},
  doi          = {10.1109/SERA51205.2021.9509271},
  timestamp    = {Fri, 13 Aug 2021 10:40:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sera/JosephZE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartiot/ChaSLH21,
  author       = {Shi{-}Cho Cha and
                  Chuang{-}Ming Shiung and
                  Gwan{-}Yen Lin and
                  Yi{-}Hsuan Hung},
  title        = {A Security Risk Management Framework for Permissioned Blockchain Applications},
  booktitle    = {{IEEE} International Conference on Smart Internet of Things, SmartIoT
                  2021, Jeju, Republic of Korea, August 13-15, 2021},
  pages        = {301--310},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SmartIoT52359.2021.00055},
  doi          = {10.1109/SMARTIOT52359.2021.00055},
  timestamp    = {Sat, 25 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smartiot/ChaSLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/GravinGKL21,
  author       = {Nick Gravin and
                  Siyao Guo and
                  Tsz Chiu Kwok and
                  Pinyan Lu},
  editor       = {D{\'{a}}niel Marx},
  title        = {Concentration bounds for almost \emph{k}-wise independence with applications
                  to non-uniform security},
  booktitle    = {Proceedings of the 2021 {ACM-SIAM} Symposium on Discrete Algorithms,
                  {SODA} 2021, Virtual Conference, January 10 - 13, 2021},
  pages        = {2404--2423},
  publisher    = {{SIAM}},
  year         = {2021},
  url          = {https://doi.org/10.1137/1.9781611976465.143},
  doi          = {10.1137/1.9781611976465.143},
  timestamp    = {Thu, 15 Jul 2021 13:48:55 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/GravinGKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/somet/ZiadiaMF21,
  author       = {Marwa Ziadia and
                  Mohamed Mejri and
                  Jaouhar Fattahi},
  editor       = {Hamido Fujita and
                  H{\'{e}}ctor P{\'{e}}rez{-}Meana},
  title        = {Formal and Automatic Security Policy Enforcement on Android Applications
                  by Rewriting},
  booktitle    = {New Trends in Intelligent Software Methodologies, Tools and Techniques
                  - Proceedings of the 20th International Conference on New Trends in
                  Intelligent Software Methodologies, Tools and Techniques, SoMeT 202,
                  Cancun, Mexico, 21-23 September, 2021},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {337},
  pages        = {85--98},
  publisher    = {{IOS} Press},
  year         = {2021},
  url          = {https://doi.org/10.3233/FAIA210011},
  doi          = {10.3233/FAIA210011},
  timestamp    = {Fri, 24 Sep 2021 11:30:21 +0200},
  biburl       = {https://dblp.org/rec/conf/somet/ZiadiaMF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CecchettiYNM21,
  author       = {Ethan Cecchetti and
                  Siqiu Yao and
                  Haobin Ni and
                  Andrew C. Myers},
  title        = {Compositional Security for Reentrant Applications},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {1249--1267},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00084},
  doi          = {10.1109/SP40001.2021.00084},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/CecchettiYNM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BrinzaCP21,
  author       = {Mihail Brinza and
                  Miguel Correia and
                  Jo{\~{a}}o Pereira},
  title        = {Virtual Static Security Analyzer for Web Applications},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {840--848},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00119},
  doi          = {10.1109/TRUSTCOM53373.2021.00119},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BrinzaCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Poniszewska-Maranda21a,
  author       = {Aneta Poniszewska{-}Maranda and
                  Lukasz Chomatek and
                  Joanna Ochelska{-}Mierzejewska},
  title        = {Secure Development Strategy Model Framework for Security of Mobile
                  Applications},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {1294--1299},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00178},
  doi          = {10.1109/TRUSTCOM53373.2021.00178},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Poniszewska-Maranda21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uemcom/DasS21,
  author       = {Saikat Das and
                  Sajjan G. Shiva},
  title        = {Machine Learning application lifecycle augmented with explanation
                  and security},
  booktitle    = {12th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile
                  Communication Conference, {UEMCON} 2021, New York, NY, USA, December
                  1-4, 2021},
  pages        = {171--177},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/UEMCON53757.2021.9666619},
  doi          = {10.1109/UEMCON53757.2021.9666619},
  timestamp    = {Tue, 18 Jan 2022 17:38:45 +0100},
  biburl       = {https://dblp.org/rec/conf/uemcom/DasS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BrinkmannDMP0SS21,
  author       = {Marcus Brinkmann and
                  Christian Dresen and
                  Robert Merget and
                  Damian Poddebniak and
                  Jens M{\"{u}}ller and
                  Juraj Somorovsky and
                  J{\"{o}}rg Schwenk and
                  Sebastian Schinzel},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{ALPACA:} Application Layer Protocol Confusion - Analyzing and Mitigating
                  Cracks in {TLS} Authentication},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4293--4310},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/brinkmann},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BrinkmannDMP0SS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BulekovJE21,
  author       = {Alexander Bulekov and
                  Rasoul Jahanshahi and
                  Manuel Egele},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Saphire: Sandboxing {PHP} Applications with Tailored System Call Allowlists},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2881--2898},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/bulekov},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BulekovJE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Chen0JCJ21,
  author       = {Yizheng Chen and
                  Shiqi Wang and
                  Weifan Jiang and
                  Asaf Cidon and
                  Suman Jana},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Cost-Aware Robust Tree Ensembles for Security Applications},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2291--2308},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-yizheng},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Chen0JCJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KimKRCKKXT21,
  author       = {Taegyu Kim and
                  Vireshwar Kumar and
                  Junghwan Rhee and
                  Jizhou Chen and
                  Kyungtae Kim and
                  Chung Hwan Kim and
                  Dongyan Xu and
                  Dave (Jing) Tian},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{PASAN:} Detecting Peripheral Access Concurrency Bugs within Bare-Metal
                  Embedded Applications},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {249--266},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/kim},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KimKRCKKXT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OltroggeHAA0F21,
  author       = {Marten Oltrogge and
                  Nicolas Huaman and
                  Sabrina Amft and
                  Yasemin Acar and
                  Michael Backes and
                  Sascha Fahl},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Why Eve and Mallory Still Love Android: Revisiting {TLS} (In)Security
                  in Android Applications},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {4347--4364},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/oltrogge},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/OltroggeHAA0F21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SuSDL0XL21,
  author       = {Liya Su and
                  Xinyue Shen and
                  Xiangyu Du and
                  Xiaojing Liao and
                  XiaoFeng Wang and
                  Luyi Xing and
                  Baoxu Liu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Evil Under the Sun: Understanding and Discovering Attacks on Ethereum
                  Decentralized Applications},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1307--1324},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/su},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SuSDL0XL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TolleyKKVC21,
  author       = {William J. Tolley and
                  Beau Kujath and
                  Mohammad Taha Khan and
                  Narseo Vallina{-}Rodriguez and
                  Jedidiah R. Crandall},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Blind In/On-Path Attacks and Applications to VPNs},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3129--3146},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/tolley},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/TolleyKKVC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TychalasBM21,
  author       = {Dimitrios Tychalas and
                  Hadjer Benkraouda and
                  Michail Maniatakos},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented
                  Fuzzing in {ICS} Control Applications},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2847--2862},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/tychalas},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/TychalasBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/UzunCKBL21,
  author       = {Erkam Uzun and
                  Simon P. Chung and
                  Vladimir Kolesnikov and
                  Alexandra Boldyreva and
                  Wenke Lee},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Fuzzy Labeled Private Set Intersection with Applications to Private
                  Real-Time Biometric Search},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {911--928},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/uzun},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/UzunCKBL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Weng0XK021,
  author       = {Chenkai Weng and
                  Kang Yang and
                  Xiang Xie and
                  Jonathan Katz and
                  Xiao Wang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications
                  to Machine Learning},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {501--518},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/weng},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Weng0XK021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Yang0HCAX021,
  author       = {Limin Yang and
                  Wenbo Guo and
                  Qingying Hao and
                  Arridhana Ciptadi and
                  Ali Ahmadzadeh and
                  Xinyu Xing and
                  Gang Wang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{CADE:} Detecting and Explaining Concept Drift Samples for Security
                  Applications},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2327--2344},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/yang-limin},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Yang0HCAX021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/SchreiberSK21,
  author       = {Andreas Schreiber and
                  Tim Sonnekalb and
                  Lynn von Kurnatowski},
  title        = {Towards Visual Analytics Dashboards for Provenance-driven Static Application
                  Security Testing},
  booktitle    = {{IEEE} Symposium on Visualization for Cyber Security, VizSec 2021,
                  New Orleans, LA, USA, October 27, 2021},
  pages        = {42--46},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VizSec53666.2021.00010},
  doi          = {10.1109/VIZSEC53666.2021.00010},
  timestamp    = {Mon, 13 Dec 2021 16:21:38 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/SchreiberSK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/ChangC0W21,
  author       = {Wei{-}Chun Chang and
                  Yao Chiang and
                  Yi Zhang and
                  Hung{-}Yu Wei},
  title        = {Edge Computing Dynamic Resource Management: Tradeoffs Between Security
                  and Application QoE},
  booktitle    = {94th {IEEE} Vehicular Technology Conference, {VTC} Fall 2021, Norman,
                  OK, USA, September 27-30, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VTC2021-Fall52928.2021.9625050},
  doi          = {10.1109/VTC2021-FALL52928.2021.9625050},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/ChangC0W21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/21/KhanR21,
  author       = {Firoz Khan and
                  Lakshmana Kumar Ramasamy},
  editor       = {Mostafa Al{-}Emran and
                  Khaled Shaalan and
                  Aboul Ella Hassanien},
  title        = {Web Services Security Using Semantic Technology},
  booktitle    = {Recent Advances in Intelligent Systems and Smart Applications},
  series       = {Studies in Systems, Decision and Control},
  volume       = {295},
  pages        = {403--427},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-47411-9\_22},
  doi          = {10.1007/978-3-030-47411-9\_22},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/21/KhanR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/21/MaitraGS21,
  author       = {Tanmoy Maitra and
                  Debasis Giri and
                  Arup Sarkar},
  title        = {Security in Critical Communication for Mobile Edge Computing Based
                  IoE Applications},
  booktitle    = {Mobile Edge Computing},
  pages        = {315--332},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-69893-5\_13},
  doi          = {10.1007/978-3-030-69893-5\_13},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/21/MaitraGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2021,
  title        = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832},
  doi          = {10.1145/3485832},
  isbn         = {978-1-4503-8579-4},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2021-1,
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13090},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92062-3},
  doi          = {10.1007/978-3-030-92062-3},
  isbn         = {978-3-030-92061-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2021-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2021-2,
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13091},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92075-3},
  doi          = {10.1007/978-3-030-92075-3},
  isbn         = {978-3-030-92074-6},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2021-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2021-3,
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13092},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92078-4},
  doi          = {10.1007/978-3-030-92078-4},
  isbn         = {978-3-030-92077-7},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2021-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2021-4,
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13093},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92068-5},
  doi          = {10.1007/978-3-030-92068-5},
  isbn         = {978-3-030-92067-8},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2021-4.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2021,
  editor       = {Anupam Joshi and
                  Barbara Carminati and
                  Rakesh M. Verma},
  title        = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security
                  and Privacy, Virtual Event, USA, April 26-28, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422337},
  doi          = {10.1145/3422337},
  isbn         = {978-1-4503-8143-7},
  timestamp    = {Wed, 21 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/conext/2021daisnac,
  title        = {DAI-SNAC@CoNEXT 2021: Proceedings of the 2021 Workshop on Descriptive
                  Approaches to IoT Security, Network, and Application Configuration,
                  Virtual Event, Munich, Germany, 7 December 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3488661},
  doi          = {10.1145/3488661},
  isbn         = {978-1-4503-9136-8},
  timestamp    = {Wed, 08 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/2021daisnac.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2021,
  editor       = {Ken Barker and
                  Kambiz Ghazinour},
  title        = {Data and Applications Security and Privacy {XXXV} - 35th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12840},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81242-3},
  doi          = {10.1007/978-3-030-81242-3},
  isbn         = {978-3-030-81241-6},
  timestamp    = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdse/2021ccis,
  editor       = {Tran Khanh Dang and
                  Josef K{\"{u}}ng and
                  Tai M. Chung and
                  Makoto Takizawa},
  title        = {Future Data and Security Engineering. Big Data, Security and Privacy,
                  Smart City and Industry 4.0 Applications - 8th International Conference,
                  {FDSE} 2021, Virtual Event, November 24-26, 2021, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1500},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-8062-5},
  doi          = {10.1007/978-981-16-8062-5},
  isbn         = {978-981-16-8061-8},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdse/2021ccis.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tpsisa/2021,
  title        = {3rd {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta,
                  GA, USA, December 13-15, 2021},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TPS-ISA52974.2021},
  doi          = {10.1109/TPS-ISA52974.2021},
  isbn         = {978-1-6654-1623-8},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tpsisa/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2021,
  editor       = {Hyoungshick Kim},
  title        = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0},
  doi          = {10.1007/978-3-030-89432-0},
  isbn         = {978-3-030-89431-3},
  timestamp    = {Fri, 29 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-03253,
  author       = {Guosong Yang and
                  Radha Poovendran and
                  Jo{\~{a}}o P. Hespanha},
  title        = {Adaptive Learning in Two-Player Stackelberg Games with Application
                  to Network Security},
  journal      = {CoRR},
  volume       = {abs/2101.03253},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.03253},
  eprinttype    = {arXiv},
  eprint       = {2101.03253},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-03253.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-05088,
  author       = {Sarah Elder and
                  Nusrat Zahan and
                  Val Kozarev and
                  Rui Shu and
                  Tim Menzies and
                  Laurie A. Williams},
  title        = {Structuring a Comprehensive Software Security Course Around the {OWASP}
                  Application Security Verification Standard},
  journal      = {CoRR},
  volume       = {abs/2103.05088},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.05088},
  eprinttype    = {arXiv},
  eprint       = {2103.05088},
  timestamp    = {Mon, 15 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-05088.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-08577,
  author       = {Ethan Cecchetti and
                  Siqiu Yao and
                  Haobin Ni and
                  Andrew C. Myers},
  title        = {Compositional Security for Reentrant Applications},
  journal      = {CoRR},
  volume       = {abs/2103.08577},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.08577},
  eprinttype    = {arXiv},
  eprint       = {2103.08577},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-08577.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-01970,
  author       = {Marius Schlegel},
  title        = {Trusted Enforcement of Application-specific Security Policies},
  journal      = {CoRR},
  volume       = {abs/2105.01970},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.01970},
  eprinttype    = {arXiv},
  eprint       = {2105.01970},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-01970.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-04773,
  author       = {Rajat Gupta and
                  Madhu Viswanatham V. and
                  Manikandan K},
  title        = {An Innovative Security Strategy using Reactive Web Application Honeypot},
  journal      = {CoRR},
  volume       = {abs/2105.04773},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.04773},
  eprinttype    = {arXiv},
  eprint       = {2105.04773},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-04773.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-05937,
  author       = {Vladimir Vakhter and
                  Betul Soysal and
                  Patrick Schaumont and
                  Ulkuhan Guler},
  title        = {Security for Emerging Miniaturized Wireless Biomedical Devices: Threat
                  Modeling with Application to Case Studies},
  journal      = {CoRR},
  volume       = {abs/2105.05937},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.05937},
  eprinttype    = {arXiv},
  eprint       = {2105.05937},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-05937.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-13634,
  author       = {Eman Alashwali and
                  Fatimah Alashwali},
  title        = {Saudi Parents' Security and Privacy Concerns about their Children's
                  Smart Device Applications},
  journal      = {CoRR},
  volume       = {abs/2105.13634},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.13634},
  eprinttype    = {arXiv},
  eprint       = {2105.13634},
  timestamp    = {Fri, 16 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-13634.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-13524,
  author       = {Jagruti Sahoo},
  title        = {Cost-efficient, QoS and Security aware Placement of Smart Farming
                  IoT Applications in Cloud-Fog Infrastructure},
  journal      = {CoRR},
  volume       = {abs/2106.13524},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.13524},
  eprinttype    = {arXiv},
  eprint       = {2106.13524},
  timestamp    = {Wed, 30 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-13524.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-01921,
  author       = {Roland Croft and
                  Dominic Newlands and
                  Ziyu Chen and
                  Muhammad Ali Babar},
  title        = {An Empirical Study of Rule-Based and Learning-Based Approaches for
                  Static Application Security Testing},
  journal      = {CoRR},
  volume       = {abs/2107.01921},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.01921},
  eprinttype    = {arXiv},
  eprint       = {2107.01921},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-01921.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-07300,
  author       = {Angel Luis Scull Pupo and
                  Jens Nicolay and
                  Elisa Gonzalez Boix},
  title        = {Deriving Static Security Testing from Runtime Security Protection
                  for Web Applications},
  journal      = {CoRR},
  volume       = {abs/2107.07300},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.07300},
  eprinttype    = {arXiv},
  eprint       = {2107.07300},
  timestamp    = {Wed, 21 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-07300.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-13754,
  author       = {I Wayan Budi Sentana and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar and
                  Shlomo Berkovsky},
  title        = {Empirical Security and Privacy Analysis of Mobile Symptom Checking
                  Applications on Google Play},
  journal      = {CoRR},
  volume       = {abs/2107.13754},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.13754},
  eprinttype    = {arXiv},
  eprint       = {2107.13754},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-13754.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-02352,
  author       = {Sotirios Brotsis and
                  Konstantinos Limniotis and
                  Gueltoum Bendiab and
                  Nicholas Kolokotronis and
                  Stavros Shiaeles},
  title        = {On the Suitability of Blockchain Platforms for IoT Applications: Architectures,
                  Security, Privacy, and Performance},
  journal      = {CoRR},
  volume       = {abs/2109.02352},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.02352},
  eprinttype    = {arXiv},
  eprint       = {2109.02352},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-02352.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-03621,
  author       = {Sotirios Brotsis and
                  Nicholas Kolokotronis and
                  Konstantinos Limniotis and
                  Stavros Shiaeles},
  title        = {On the Security of Permissioned Blockchain Solutions for IoT Applications},
  journal      = {CoRR},
  volume       = {abs/2109.03621},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.03621},
  eprinttype    = {arXiv},
  eprint       = {2109.03621},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-03621.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-11495,
  author       = {Dongqi Han and
                  Zhiliang Wang and
                  Wenqi Chen and
                  Ying Zhong and
                  Su Wang and
                  Han Zhang and
                  Jiahai Yang and
                  Xingang Shi and
                  Xia Yin},
  title        = {DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection
                  in Security Applications},
  journal      = {CoRR},
  volume       = {abs/2109.11495},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.11495},
  eprinttype    = {arXiv},
  eprint       = {2109.11495},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-11495.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-05562,
  author       = {Manar H. Alalfi and
                  Sajeda Parveen and
                  Bara' Nazzal},
  title        = {A Mutation Framework for Evaluating Security Analysis tools in IoT
                  Applications},
  journal      = {CoRR},
  volume       = {abs/2110.05562},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.05562},
  eprinttype    = {arXiv},
  eprint       = {2110.05562},
  timestamp    = {Thu, 21 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-05562.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-12974,
  author       = {Riccardo Colelli and
                  Chiara Foglietta and
                  Roberto Fusacchia and
                  Stefano Panzieri and
                  Federica Pascucci},
  title        = {Blockchain application in simulated environment for Cyber-Physical
                  Systems Security},
  journal      = {CoRR},
  volume       = {abs/2110.12974},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.12974},
  eprinttype    = {arXiv},
  eprint       = {2110.12974},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-12974.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-02268,
  author       = {Liang Wang and
                  Prateek Mittal and
                  Jennifer Rexford},
  title        = {Data-Plane Security Applications in Adversarial Settings},
  journal      = {CoRR},
  volume       = {abs/2111.02268},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.02268},
  eprinttype    = {arXiv},
  eprint       = {2111.02268},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-02268.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-03573,
  author       = {David G. Balash and
                  Xiaoyuan Wu and
                  Miles Grant and
                  Irwin Reyes and
                  Adam J. Aviv},
  title        = {Security and Privacy Perceptions of Third-Party Application Access
                  for Google Accounts (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/2111.03573},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.03573},
  eprinttype    = {arXiv},
  eprint       = {2111.03573},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-03573.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-04778,
  author       = {Pierre{-}Yves Piriou and
                  Olivier Boudeville and
                  Gilles Deleuze and
                  Sara {Tucci Piergiovanni} and
                  {\"{O}}nder G{\"{u}}rcan},
  title        = {Justifying the Dependability and Security of Business-Critical Blockchain-based
                  Applications},
  journal      = {CoRR},
  volume       = {abs/2112.04778},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.04778},
  eprinttype    = {arXiv},
  eprint       = {2112.04778},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-04778.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-09296,
  author       = {Zulfiqar Ali Khan and
                  Akbar Siami Namin},
  title        = {A Survey on the Applications of Blockchains in Security of IoT Systems},
  journal      = {CoRR},
  volume       = {abs/2112.09296},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.09296},
  eprinttype    = {arXiv},
  eprint       = {2112.09296},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-09296.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/Han21,
  author       = {Hui Han},
  title        = {Standardisation for Security Applications and Technologies},
  journal      = {{ERCIM} News},
  volume       = {2021},
  number       = {126},
  year         = {2021},
  url          = {https://ercim-news.ercim.eu/en126/r-i/standardisation-for-security-applications-and-technologies},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/Han21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Huguenin-Dumittan21,
  author       = {Lo{\"{\i}}s Huguenin{-}Dumittan and
                  Serge Vaudenay},
  title        = {A note on IND-qCCA security in the {ROM} and its applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {844},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/844},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Huguenin-Dumittan21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MunchSY21,
  author       = {Jean{-}Pierre M{\"{u}}nch and
                  Thomas Schneider and
                  Hossein Yalame},
  title        = {{VASA:} Vector {AES} Instructions for Security Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1493},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1493},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MunchSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SeresHB21,
  author       = {Istv{\'{a}}n Andr{\'{a}}s Seres and
                  M{\'{a}}t{\'{e}} Horv{\'{a}}th and
                  P{\'{e}}ter Burcsi},
  title        = {The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem:
                  Security and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/182},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SeresHB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/MayuranathanMD21a,
  title        = {Enhanced security in cloud applications using emerging blockchain
                  security algorithm},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {12},
  number       = {7},
  pages        = {6933--6945},
  year         = {2021},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/s12652-020-02339-7},
  doi          = {10.1007/S12652-020-02339-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/MayuranathanMD21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/MishraSA21,
  title        = {Analysis of security issues of cloud-based web applications},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {12},
  number       = {7},
  pages        = {7051--7062},
  year         = {2021},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/s12652-020-02370-8},
  doi          = {10.1007/S12652-020-02370-8},
  timestamp    = {Fri, 20 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/MishraSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/SikkaAS21,
  title        = {High-throughput field-programable gate array implementation of the
                  advanced encryption standard algorithm for automotive security applications},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {12},
  number       = {7},
  pages        = {7273--7279},
  year         = {2021},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/s12652-020-02403-2},
  doi          = {10.1007/S12652-020-02403-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/SikkaAS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/JamaliBHAN20,
  author       = {Mohammad Ali Jabraeil Jamali and
                  Bahareh Bahrami and
                  Arash Heidari and
                  Parisa Allahverdizadeh and
                  Farhad Norouzi},
  title        = {Towards the Internet of Things - Architectures, Security, and Applications},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-18468-1},
  doi          = {10.1007/978-3-030-18468-1},
  isbn         = {978-3-030-18467-4},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/JamaliBHAN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Damir20,
  author       = {Mohamed Taoufiq Damir},
  title        = {Well-Rounded Lattices and Applications to Physical Layer Security},
  school       = {Aalto University, Espoo, Finland},
  year         = {2020},
  url          = {https://aaltodoc.aalto.fi/handle/123456789/47215},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Damir20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Erozan20,
  author       = {Ahmet Turan Erozan},
  title        = {Security Aspects of Printed Electronics Applications},
  school       = {Karlsruhe University, Germany},
  year         = {2020},
  url          = {https://publikationen.bibliothek.kit.edu/1000121179},
  doi          = {10.5445/IR/1000121179},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Erozan20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Ramnath20a,
  author       = {Vishalini R. Laguduva},
  title        = {Machine Learning for the Internet of Things: Applications, Implementation,
                  and Security},
  school       = {University of South Florida, Tampa, {USA}},
  year         = {2020},
  url          = {https://digitalcommons.usf.edu/etd/8240},
  timestamp    = {Thu, 29 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Ramnath20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Brasser20,
  author       = {Franz Ferdinand Peter Brasser},
  title        = {Enclave Computing Paradigm: Hardware-assisted Security Architectures
                  {\&} Applications},
  school       = {Technical University of Darmstadt, Germany},
  year         = {2020},
  url          = {http://tuprints.ulb.tu-darmstadt.de/11912/},
  urn          = {urn:nbn:de:tuda-tuprints-119123},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Brasser20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Hecker20,
  author       = {Martin Hecker},
  title        = {Timing Sensitive Dependency Analysis and its Application to Software
                  Security},
  school       = {Karlsruhe Institute of Technology, Germany},
  year         = {2020},
  url          = {https://nbn-resolving.org/urn:nbn:de:101:1-2020093004585089743391},
  urn          = {urn:nbn:de:101:1-2020093004585089743391},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Hecker20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Staicu20,
  author       = {Cristian{-}Alexandru Staicu},
  title        = {Enhancing the Security and Privacy of Full-Stack JavaScript Web Applications},
  school       = {Darmstadt University of Technology, Germany},
  year         = {2020},
  url          = {http://tuprints.ulb.tu-darmstadt.de/11808/},
  urn          = {urn:nbn:de:tuda-tuprints-118087},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Staicu20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/AlAni20a,
  author       = {Ruqayah Al{-}Ani},
  title        = {A pseudonym-based solution for efficient security and enhanced privacy
                  in {VANET} safety applications},
  school       = {Liverpool John Moores University, {UK}},
  year         = {2020},
  url          = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.815674},
  doi          = {10.24377/LJMU.T.00013661},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/AlAni20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Mitev20,
  author       = {Miroslav Mitev},
  title        = {Physical layer security for IoT applications},
  school       = {University of Essex, Colchester, {UK}},
  year         = {2020},
  url          = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.821990},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/ethos/Mitev20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Brejon20,
  author       = {Jean{-}Baptiste Br{\'{e}}jon},
  title        = {Quantification de la s{\'{e}}curit{\'{e}} des applications
                  en pr{\'{e}}sence d'attaques physiques et d{\'{e}}tection
                  de chemins d'attaques. (Software security quantifcation before physical
                  attacks and detection of attack paths)},
  school       = {Pierre and Marie Curie University, Paris, France},
  year         = {2020},
  url          = {https://tel.archives-ouvertes.fr/tel-03140951},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/hal/Brejon20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Mai20,
  author       = {Hoang Long Mai},
  title        = {Towards a Content-oriented Security Plane for Named Data Networking
                  : Application to Content Poisoning Attack. (S{\'{e}}curit{\'{e}}
                  orient{\'{e}}e contenu pour les r{\'{e}}seaux {NDN} - application
                  aux attaques par empoisonnement de type {CPA)}},
  school       = {University of Technology of Troyes, France},
  year         = {2020},
  url          = {https://tel.archives-ouvertes.fr/tel-03808702},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/hal/Mai20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Rasoamiaramanana20,
  author       = {Sandra Rasoamiaramanana},
  title        = {Design of white-box encryption schemes for mobile applications security.
                  (Conception de sch{\'{e}}mas de chiffrement bo{\^{\i}}te blanche
                  pour la s{\'{e}}curit{\'{e}} des applications mobiles)},
  school       = {University of Lorraine, Nancy, France},
  year         = {2020},
  url          = {https://tel.archives-ouvertes.fr/tel-02949394},
  timestamp    = {Tue, 03 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/hal/Rasoamiaramanana20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/tr/Demirci20,
  author       = {Sedef Demirci},
  title        = {Sanal a{\u{g}} g{\"{u}}venli{\u{g}}i fonksiyonlar{\i}n{\i}n enerji
                  etkinyerle{\c{s}}tirilmesi: Y{\"{o}}ntem {\"{o}}nerileri
                  ve uygulama (Energy efficient placement of virtual security functions:Method
                  proposals and application)},
  school       = {Gazi University, Turkey},
  year         = {2020},
  url          = {https://tez.yok.gov.tr/UlusalTezMerkezi/tezDetay.jsp?id=ent3Mo1UqSZIiX13Ajs7HQ\&no=xg9mTZ0f6b2ux20wvZFnZw},
  timestamp    = {Sun, 19 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/tr/Demirci20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Mirzamohammadi20,
  author       = {Saeed Mirzamohammadi},
  title        = {Security Monitor for Mobile Devices: Design and Applications},
  school       = {University of California, Irvine, {USA}},
  year         = {2020},
  url          = {https://www.escholarship.org/uc/item/2rx8j3s0},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Mirzamohammadi20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/AlrabaeeDSWYRNMHH20,
  author       = {Saed Alrabaee and
                  Mourad Debbabi and
                  Paria Shirani and
                  Lingyu Wang and
                  Amr M. Youssef and
                  Ashkan Rahimian and
                  Lina Nouh and
                  Djedjiga Mouheb and
                  He Huang and
                  Aiman Hanna},
  title        = {Binary Code Fingerprinting for Cybersecurity - Application to Malicious
                  Code Fingerprinting},
  series       = {Advances in Information Security},
  volume       = {78},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-34238-8},
  doi          = {10.1007/978-3-030-34238-8},
  isbn         = {978-3-030-34237-1},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/AlrabaeeDSWYRNMHH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/synthesis/2020Pasareanu,
  author       = {Corina S. Pasareanu},
  title        = {Symbolic Execution and Quantitative Reasoning: Applications to Software
                  Safety and Security},
  series       = {Synthesis Lectures on Software Engineering},
  publisher    = {Morgan {\&} Claypool Publishers},
  year         = {2020},
  url          = {https://doi.org/10.2200/S01010ED2V01Y202005SWE006},
  doi          = {10.2200/S01010ED2V01Y202005SWE006},
  isbn         = {978-3-031-01423-9},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/synthesis/2020Pasareanu.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AgrawalPBAAKK20,
  author       = {Alka Agrawal and
                  Abhishek Kumar Pandey and
                  Abdullah Baz and
                  Hosam Alhakami and
                  Wajdi Alhakami and
                  Rajeev Kumar and
                  Raees Ahmad Khan},
  title        = {Evaluating the Security Impact of Healthcare Web Applications Through
                  Fuzzy Based Hybrid Approach of Multi-Criteria Decision-Making Analysis},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {135770--135783},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3010729},
  doi          = {10.1109/ACCESS.2020.3010729},
  timestamp    = {Sat, 05 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AgrawalPBAAKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AhmadKBAA20,
  author       = {Musheer Ahmad and
                  Ishfaq Ahmad Khaja and
                  Abdullah Baz and
                  Hosam Alhakami and
                  Wajdi Alhakami},
  title        = {Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes
                  Generation for Security Applications},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {116132--116147},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3004449},
  doi          = {10.1109/ACCESS.2020.3004449},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AhmadKBAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AhsanGNPKM20,
  author       = {Md. Manjurul Ahsan and
                  Kishor Datta Gupta and
                  Abhijit Kumar Nag and
                  Subash Poudyal and
                  Abbas Z. Kouzani and
                  M. A. Parvez Mahmud},
  title        = {Applications and Evaluations of Bio-Inspired Approaches in Cloud Security:
                  {A} Review},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {180799--180814},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3027841},
  doi          = {10.1109/ACCESS.2020.3027841},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AhsanGNPKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AleneziAKK20,
  author       = {Mamdouh Alenezi and
                  Alka Agrawal and
                  Rajeev Kumar and
                  Raees Ahmad Khan},
  title        = {Evaluating Performance of Web Application Security Through a Fuzzy
                  Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics
                  Perspective},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {25543--25556},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2970784},
  doi          = {10.1109/ACCESS.2020.2970784},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AleneziAKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Bagheri-Sanjareh20,
  author       = {Mehrdad Bagheri{-}Sanjareh and
                  Mohammad Hassan Nazari and
                  Gevork B. Gharehpetian},
  title        = {A Novel and Optimal Battery Sizing Procedure Based on {MG} Frequency
                  Security Criterion Using Coordinated Application of BESS, {LED} Lighting
                  Loads, and Photovoltaic Systems},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {95345--95359},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2995461},
  doi          = {10.1109/ACCESS.2020.2995461},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/Bagheri-Sanjareh20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KumarKAAAK20,
  author       = {Rajeev Kumar and
                  Asif Irshad Khan and
                  Yoosef B. Abushark and
                  Md. Mottahir Alam and
                  Alka Agrawal and
                  Raees Ahmad Khan},
  title        = {A Knowledge-Based Integrated System of Hesitant Fuzzy Set, {AHP} and
                  {TOPSIS} for Evaluating Security-Durability of Web Applications},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {48870--48885},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2978038},
  doi          = {10.1109/ACCESS.2020.2978038},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KumarKAAAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KumarKAAAK20a,
  author       = {Rajeev Kumar and
                  Asif Irshad Khan and
                  Yoosef B. Abushark and
                  Md. Mottahir Alam and
                  Alka Agrawal and
                  Raees Ahmad Khan},
  title        = {An Integrated Approach of Fuzzy Logic, {AHP} and {TOPSIS} for Estimating
                  Usable-Security of Web Applications},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {50944--50957},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2970245},
  doi          = {10.1109/ACCESS.2020.2970245},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KumarKAAAK20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuLLGS20,
  author       = {Yuzhou Liu and
                  Lei Liu and
                  Huaxiao Liu and
                  Shanquan Gao and
                  Guohang Song},
  title        = {Recommending Security Requirements for the Development of Android
                  Applications Based on Sensitive APIs},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {101591--101606},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2997335},
  doi          = {10.1109/ACCESS.2020.2997335},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiuLLGS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/NurgalievaOD20,
  author       = {Leysan Nurgalieva and
                  David O'Callaghan and
                  Gavin Doherty},
  title        = {Security and Privacy of mHealth Applications: {A} Scoping Review},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {104247--104268},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2999934},
  doi          = {10.1109/ACCESS.2020.2999934},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/NurgalievaOD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SaleemAAAIR20,
  author       = {Kashif Saleem and
                  Ghadah Majid Alabduljabbar and
                  Nouf Alrowais and
                  Jalal Al{-}Muhtadi and
                  Muhammad Imran and
                  Joel J. P. C. Rodrigues},
  title        = {Bio-Inspired Network Security for 5G-Enabled IoT Applications},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {229152--229160},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3046325},
  doi          = {10.1109/ACCESS.2020.3046325},
  timestamp    = {Tue, 11 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/SaleemAAAIR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YohanandhanEMM20,
  author       = {Rajaa Vikhram Yohanandhan and
                  Rajvikram Madurai Elavarasan and
                  Premkumar Manoharan and
                  Lucian Mihet{-}Popa},
  title        = {Cyber-Physical Power System {(CPPS):} {A} Review on Modeling, Simulation,
                  and Analysis With Cyber Security Applications},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {151019--151064},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3016826},
  doi          = {10.1109/ACCESS.2020.3016826},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YohanandhanEMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangLDD20,
  author       = {Hongzhou Zhang and
                  Peiyue Li and
                  Zhiguo Du and
                  Wei Dou},
  title        = {Risk Entropy Modeling of Surveillance Camera for Public Security Application},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {45343--45355},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2978247},
  doi          = {10.1109/ACCESS.2020.2978247},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangLDD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/candie/NoltingSRAP20,
  author       = {Lars Nolting and
                  Thomas Spiegel and
                  Marius Reich and
                  Mario Adam and
                  Aaron Praktiknjo},
  title        = {Can energy system modeling benefit from artificial neural networks?
                  Application of two-stage metamodels to reduce computation of security
                  of supply assessments},
  journal      = {Comput. Ind. Eng.},
  volume       = {142},
  pages        = {106334},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cie.2020.106334},
  doi          = {10.1016/J.CIE.2020.106334},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/candie/NoltingSRAP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhongH20,
  author       = {Sheng Zhong and
                  Xinyi Huang},
  title        = {Special focus on security and privacy in blockchain-based applications},
  journal      = {Sci. China Inf. Sci.},
  volume       = {63},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11432-020-2781-0},
  doi          = {10.1007/S11432-020-2781-0},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhongH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LatifaKG20,
  author       = {Latifa Er{-}Rajy and
                  My Ahmed El Kiram and
                  Mohamed El Ghazouani},
  title        = {New Security Risk Value Estimate Method for Android Applications},
  journal      = {Comput. J.},
  volume       = {63},
  number       = {4},
  pages        = {593--603},
  year         = {2020},
  url          = {https://doi.org/10.1093/comjnl/bxz109},
  doi          = {10.1093/COMJNL/BXZ109},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LatifaKG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/SinghBT20,
  author       = {Surendra Singh and
                  Suvadip Batabyal and
                  Sachin Tripathi},
  title        = {Security aware dynamic scheduling algorithm {(SADSA)} for real-time
                  applications on grid},
  journal      = {Clust. Comput.},
  volume       = {23},
  number       = {2},
  pages        = {989--1005},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10586-019-02970-w},
  doi          = {10.1007/S10586-019-02970-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/SinghBT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/SudhakarR20,
  author       = {Rayapati Venkata Sudhakar and
                  T. Ch. Malleswara Rao},
  title        = {Security aware index based quasi-identifier approach for privacy preservation
                  of data sets for cloud applications},
  journal      = {Clust. Comput.},
  volume       = {23},
  number       = {4},
  pages        = {2579--2589},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10586-019-03028-7},
  doi          = {10.1007/S10586-019-03028-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/SudhakarR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/KimKYJKHYOKHD20,
  author       = {Jinyong Tim Kim and
                  Eunsoo Kim and
                  Jinhyuk Yang and
                  Jaehoon Jeong and
                  Hyoungshick Kim and
                  Sangwon Hyun and
                  Hyunsik Yang and
                  Jaewook Oh and
                  Younghan Kim and
                  Susan Hares and
                  Linda Dunbar},
  title        = {{IBCS:} Intent-Based Cloud Services for Security Applications},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {58},
  number       = {4},
  pages        = {45--51},
  year         = {2020},
  url          = {https://doi.org/10.1109/MCOM.001.1900476},
  doi          = {10.1109/MCOM.001.1900476},
  timestamp    = {Wed, 26 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cm/KimKYJKHYOKHD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cmmm/SuGZLL20,
  author       = {Xin Su and
                  Qingbo Gong and
                  Yi Zheng and
                  Xuchong Liu and
                  Kuan{-}Ching Li},
  title        = {An Informative and Comprehensive Behavioral Characteristics Analysis
                  Methodology of Android Application for Data Security in Brain-Machine
                  Interfacing},
  journal      = {Comput. Math. Methods Medicine},
  volume       = {2020},
  pages        = {3658795:1--3658795:14},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/3658795},
  doi          = {10.1155/2020/3658795},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cmmm/SuGZLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cogcom/Faundez-ZanuyFF20,
  author       = {Marcos Fa{\'{u}}ndez{-}Zanuy and
                  Julian Fi{\'{e}}rrez and
                  Miguel A. Ferrer and
                  Mois{\'{e}}s D{\'{\i}}az Cabrera and
                  Ruben Tolosana and
                  R{\'{e}}jean Plamondon},
  title        = {Handwriting Biometrics: Applications and Future Trends in e-Security
                  and e-Health},
  journal      = {Cogn. Comput.},
  volume       = {12},
  number       = {5},
  pages        = {940--953},
  year         = {2020},
  url          = {https://doi.org/10.1007/s12559-020-09755-z},
  doi          = {10.1007/S12559-020-09755-Z},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cogcom/Faundez-ZanuyFF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/JingGLZXJSTZ20,
  author       = {Zhengjun Jing and
                  Chunsheng Gu and
                  Yong Li and
                  Mengshi Zhang and
                  Guangquan Xu and
                  Alireza Jolfaei and
                  Peizhong Shi and
                  Chenkai Tan and
                  James Xi Zheng},
  title        = {Security analysis of indistinguishable obfuscation for internet of
                  medical things applications},
  journal      = {Comput. Commun.},
  volume       = {161},
  pages        = {202--211},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.07.033},
  doi          = {10.1016/J.COMCOM.2020.07.033},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/JingGLZXJSTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuZG20,
  author       = {Kexin Hu and
                  Zhenfeng Zhang and
                  Kaiwen Guo},
  title        = {Corrigendum to "Breaking the binding: Attacks on the Merkle approach
                  to prove liabilities and its applications" [Computers {\&} Security,
                  Volume 87, 2019, 101585]},
  journal      = {Comput. Secur.},
  volume       = {94},
  pages        = {101878},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101878},
  doi          = {10.1016/J.COSE.2020.101878},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuZG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LandauerSWR20,
  author       = {Max Landauer and
                  Florian Skopik and
                  Markus Wurzenberger and
                  Andreas Rauber},
  title        = {System log clustering approaches for cyber security applications:
                  {A} survey},
  journal      = {Comput. Secur.},
  volume       = {92},
  pages        = {101739},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101739},
  doi          = {10.1016/J.COSE.2020.101739},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LandauerSWR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RochaSE20,
  author       = {Thiago S. Rocha and
                  Eduardo Souto and
                  Khalil El{-}Khatib},
  title        = {Functionality-based mobile application recommendation system with
                  security and privacy awareness},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101972},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101972},
  doi          = {10.1016/J.COSE.2020.101972},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RochaSE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShiHLKKC20,
  author       = {Shuyun Shi and
                  Debiao He and
                  Li Li and
                  Neeraj Kumar and
                  Muhammad Khurram Khan and
                  Kim{-}Kwang Raymond Choo},
  title        = {Applications of blockchain in ensuring the security and privacy of
                  electronic health record systems: {A} survey},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101966},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101966},
  doi          = {10.1016/J.COSE.2020.101966},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ShiHLKKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/ChangMR20,
  author       = {Victor Chang and
                  V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and
                  Muthu Ramachandran},
  title        = {Emerging applications of internet of things, big data, security, and
                  complexity: special issue on collaboration opportunity for IoTBDS
                  and {COMPLEXIS}},
  journal      = {Computing},
  volume       = {102},
  number       = {6},
  pages        = {1301--1304},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00607-020-00811-y},
  doi          = {10.1007/S00607-020-00811-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/ChangMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/CasalicchioI20,
  author       = {Emiliano Casalicchio and
                  Stefano Iannucci},
  title        = {The state-of-the-art in container technologies: Application, orchestration
                  and security},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {32},
  number       = {17},
  year         = {2020},
  url          = {https://doi.org/10.1002/cpe.5668},
  doi          = {10.1002/CPE.5668},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/CasalicchioI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/OgielaO20,
  author       = {Lidia Ogiela and
                  Marek R. Ogiela},
  title        = {Cognitive security paradigm for cloud computing applications},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {32},
  number       = {8},
  year         = {2020},
  url          = {https://doi.org/10.1002/cpe.5316},
  doi          = {10.1002/CPE.5316},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/OgielaO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eInformatica/JabangweN20,
  author       = {Ronald Jabangwe and
                  Anh Nguyen{-}Duc},
  title        = {SIoT Framework: Towards an Approach for Early Identification of Security
                  Requirements for Internet-of-things Applications},
  journal      = {e Informatica Softw. Eng. J.},
  volume       = {14},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.37190/e-inf200103},
  doi          = {10.37190/E-INF200103},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eInformatica/JabangweN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/el/ZhuSM20,
  author       = {Shanying Zhu and
                  Vijayalakshmi Saravanan and
                  BalaAnand Muthu},
  title        = {Achieving data security and privacy across healthcare applications
                  using cyber security mechanisms},
  journal      = {Electron. Libr.},
  volume       = {38},
  number       = {5/6},
  pages        = {979--995},
  year         = {2020},
  url          = {https://doi.org/10.1108/EL-07-2020-0219},
  doi          = {10.1108/EL-07-2020-0219},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/el/ZhuSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/AlgarniBISES20,
  author       = {Abeer D. Algarni and
                  Ghada M. El Banby and
                  Sahar Ismail and
                  Walid El Shafai and
                  Fathi E. Abd El{-}Samie and
                  Naglaa F. Soliman},
  title        = {Discrete Transforms and Matrix Rotation Based Cancelable Face and
                  Fingerprint Recognition for Biometric Security Applications},
  journal      = {Entropy},
  volume       = {22},
  number       = {12},
  pages        = {1361},
  year         = {2020},
  url          = {https://doi.org/10.3390/e22121361},
  doi          = {10.3390/E22121361},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/AlgarniBISES20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AlbaneseBMM20,
  author       = {Massimiliano Albanese and
                  Alessandra De Benedictis and
                  Douglas D. J. de Macedo and
                  Fabrizio Messina},
  title        = {Security and trust in cloud application life-cycle management},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {111},
  pages        = {934--936},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2020.01.025},
  doi          = {10.1016/J.FUTURE.2020.01.025},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/AlbaneseBMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/CinqueCP20,
  author       = {Marcello Cinque and
                  Raffaele Della Corte and
                  Antonio Pecchia},
  title        = {Contextual filtering and prioritization of computer application logs
                  for security situational awareness},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {111},
  pages        = {668--680},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2019.09.005},
  doi          = {10.1016/J.FUTURE.2019.09.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/CinqueCP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/GargKBKKB20,
  author       = {Sahil Garg and
                  Kuljeet Kaur and
                  Shalini Batra and
                  Georges Kaddoum and
                  Neeraj Kumar and
                  Azzedine Boukerche},
  title        = {A multi-stage anomaly detection scheme for augmenting the security
                  in IoT-enabled applications},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {104},
  pages        = {105--118},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2019.09.038},
  doi          = {10.1016/J.FUTURE.2019.09.038},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/GargKBKKB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/NebbioneC20,
  author       = {Giuseppe Nebbione and
                  Maria Carla Calzarossa},
  title        = {Security of IoT Application Layer Protocols: Challenges and Findings},
  journal      = {Future Internet},
  volume       = {12},
  number       = {3},
  pages        = {55},
  year         = {2020},
  url          = {https://doi.org/10.3390/fi12030055},
  doi          = {10.3390/FI12030055},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/NebbioneC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gpem/OReillyTPSGLKH20,
  author       = {Una{-}May O'Reilly and
                  Jamal Toutouh and
                  Marcos A. Pertierra and
                  Daniel Prado Sanchez and
                  Dennis Garcia and
                  Anthony Erb Lugo and
                  Jonathan Kelly and
                  Erik Hemberg},
  title        = {Adversarial genetic programming for cyber security: a rising application
                  domain where {GP} matters},
  journal      = {Genet. Program. Evolvable Mach.},
  volume       = {21},
  number       = {1-2},
  pages        = {219--250},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10710-020-09389-y},
  doi          = {10.1007/S10710-020-09389-Y},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/gpem/OReillyTPSGLKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/grid/SodhroPML20,
  author       = {Ali Hassan Sodhro and
                  Sandeep Pirbhulal and
                  Muhammad Muzammal and
                  Zongwei Luo},
  title        = {Towards Blockchain-Enabled Security Technique for Industrial Internet
                  of Things Based Decentralized Applications},
  journal      = {J. Grid Comput.},
  volume       = {18},
  number       = {4},
  pages        = {615--628},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10723-020-09527-x},
  doi          = {10.1007/S10723-020-09527-X},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/grid/SodhroPML20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeenl/SalmanGUJ20,
  author       = {Tara Salman and
                  Ali Ghubaish and
                  Devrim Unal and
                  Raj Jain},
  title        = {Safety Score as an Evaluation Metric for Machine Learning Models of
                  Security Applications},
  journal      = {{IEEE} Netw. Lett.},
  volume       = {2},
  number       = {4},
  pages        = {207--211},
  year         = {2020},
  url          = {https://doi.org/10.1109/lnet.2020.3016583},
  doi          = {10.1109/LNET.2020.3016583},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeenl/SalmanGUJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cds/NingFUM20,
  author       = {Huansheng Ning and
                  Fadi Farha and
                  Ata Ullah and
                  Lingfeng Mao},
  title        = {Physical unclonable function: architectures, applications and challenges
                  for dependable security},
  journal      = {{IET} Circuits Devices Syst.},
  volume       = {14},
  number       = {4},
  pages        = {407--424},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-cds.2019.0175},
  doi          = {10.1049/IET-CDS.2019.0175},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-cds/NingFUM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/AhmadianSS20,
  author       = {Mohammad Mehdi Ahmadian and
                  Mehdi Shajari and
                  Mohammad Ali Shafiee},
  title        = {Industrial control system security taxonomic framework with application
                  to a comprehensive incidents survey},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {29},
  pages        = {100356},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100356},
  doi          = {10.1016/J.IJCIP.2020.100356},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/AhmadianSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/AbdullahAA20,
  author       = {Hamsa A. Abdullah and
                  Hikmat N. Abdullah and
                  Waleed A. Mahmoud Al{-}Jawher},
  title        = {A hybrid chaotic map for communication security applications},
  journal      = {Int. J. Commun. Syst.},
  volume       = {33},
  number       = {4},
  year         = {2020},
  url          = {https://doi.org/10.1002/dac.4236},
  doi          = {10.1002/DAC.4236},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/AbdullahAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijeb/SavolaKA20,
  author       = {Reijo M. Savola and
                  Markku Kyl{\"{a}}np{\"{a}}{\"{a}} and
                  Habtamu Abie},
  title        = {Risk-driven security metrics for an Android smartphone application},
  journal      = {Int. J. Electron. Bus.},
  volume       = {15},
  number       = {4},
  pages        = {297--324},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJEB.2020.111059},
  doi          = {10.1504/IJEB.2020.111059},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijeb/SavolaKA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesma/Elsantil20,
  author       = {Yasmeen Elsantil},
  title        = {User Perceptions of the Security of Mobile Applications},
  journal      = {Int. J. {E} Serv. Mob. Appl.},
  volume       = {12},
  number       = {4},
  pages        = {24--41},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJESMA.2020100102},
  doi          = {10.4018/IJESMA.2020100102},
  timestamp    = {Fri, 08 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijesma/Elsantil20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfogcomp/NewareS20,
  author       = {Rahul Neware and
                  Urmila Shrawankar},
  title        = {Fog Computing Architecture, Applications and Security Issues},
  journal      = {Int. J. Fog Comput.},
  volume       = {3},
  number       = {1},
  pages        = {75--105},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijfc.2020010105},
  doi          = {10.4018/IJFC.2020010105},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijfogcomp/NewareS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/Alghamdi20,
  author       = {Mohammed I. Alghamdi},
  title        = {Survey on Applications of Deep Learning and Machine Learning Techniques
                  for Cyber Security},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {14},
  number       = {16},
  pages        = {210--224},
  year         = {2020},
  url          = {https://doi.org/10.3991/ijim.v14i16.16953},
  doi          = {10.3991/IJIM.V14I16.16953},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/Alghamdi20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/BalapourNS20,
  author       = {Ali Balapour and
                  Hamid Reza Nikkhah and
                  Rajiv Sabherwal},
  title        = {Mobile application security: Role of perceived privacy as the predictor
                  of security perceptions},
  journal      = {Int. J. Inf. Manag.},
  volume       = {52},
  pages        = {102063},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2019.102063},
  doi          = {10.1016/J.IJINFOMGT.2019.102063},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/BalapourNS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/WarkentinO20,
  author       = {Merrill Warkentin and
                  Craig P. Orgeron},
  title        = {Using the security triad to assess blockchain technology in public
                  sector applications},
  journal      = {Int. J. Inf. Manag.},
  volume       = {52},
  pages        = {102090},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2020.102090},
  doi          = {10.1016/J.IJINFOMGT.2020.102090},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/WarkentinO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsssp/NabiYT20,
  author       = {Faisal Nabi and
                  Jianming Yong and
                  Xiaohui Tao},
  title        = {A Security Review of Event-Based Application Function and Service
                  Component Architecture},
  journal      = {Int. J. Syst. Softw. Secur. Prot.},
  volume       = {11},
  number       = {2},
  pages        = {58--70},
  year         = {2020},
  url          = {https://doi.org/10.4018/ijsssp.2020070104},
  doi          = {10.4018/IJSSSP.2020070104},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsssp/NabiYT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/NabilKH20,
  author       = {Mohamed Nabil and
                  Ashraf A. M. Khalaf and
                  Sara M. Hassan},
  title        = {A new-one-time-pad stream cipher: new design, hardware implementation
                  and its application in security of UAVs},
  journal      = {Int. J. Wirel. Mob. Comput.},
  volume       = {19},
  number       = {4},
  pages        = {352--366},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJWMC.2020.112548},
  doi          = {10.1504/IJWMC.2020.112548},
  timestamp    = {Mon, 01 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijwmc/NabilKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/WahshehL20,
  author       = {Heider A. M. Wahsheh and
                  Flaminia L. Luccio},
  title        = {Security and Privacy of {QR} Code Applications: {A} Comprehensive
                  Study, General Guidelines and Solutions},
  journal      = {Inf.},
  volume       = {11},
  number       = {4},
  pages        = {217},
  year         = {2020},
  url          = {https://doi.org/10.3390/info11040217},
  doi          = {10.3390/INFO11040217},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/information/WahshehL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/TaoGH20,
  author       = {Chuanqi Tao and
                  Hongjing Guo and
                  Zhiqiu Huang},
  title        = {Identifying security issues for mobile applications based on user
                  review summarization},
  journal      = {Inf. Softw. Technol.},
  volume       = {122},
  pages        = {106290},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.infsof.2020.106290},
  doi          = {10.1016/J.INFSOF.2020.106290},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/TaoGH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/NisarJHWHASPK20,
  author       = {Kashif Nisar and
                  Emilia Rosa Jimson and
                  Mohd. Hanafi Ahmad Hijazi and
                  Ian Welch and
                  Rosilah Hassan and
                  Azana Hafizah Mohd Aman and
                  Ali Hassan Sodhro and
                  Sandeep Pirbhulal and
                  Sohrab Khan},
  title        = {A survey on the architecture, application, and security of software
                  defined networking: Challenges and open issues},
  journal      = {Internet Things},
  volume       = {12},
  pages        = {100289},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.iot.2020.100289},
  doi          = {10.1016/J.IOT.2020.100289},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iot/NisarJHWHASPK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/AbdalzaherM20,
  author       = {Mohamed S. Abdalzaher and
                  Osamu Muta},
  title        = {A Game-Theoretic Approach for Enhancing Security and Data Trustworthiness
                  in IoT Applications},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {11},
  pages        = {11250--11261},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2996671},
  doi          = {10.1109/JIOT.2020.2996671},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/AbdalzaherM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/DiegoSFR20,
  author       = {Jorge David de Hoz Diego and
                  Jose Saldana and
                  Juli{\'{a}}n Fern{\'{a}}ndez{-}Navajas and
                  Jos{\'{e}} Ru{\'{\i}}z{-}Mas},
  title        = {Decoupling Security From Applications in CoAP-Based IoT Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {1},
  pages        = {467--476},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2951306},
  doi          = {10.1109/JIOT.2019.2951306},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/DiegoSFR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/Park20,
  author       = {Chang{-}Seop Park},
  title        = {Security Architecture for Secure Multicast CoAP Applications},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {4},
  pages        = {3441--3452},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2970175},
  doi          = {10.1109/JIOT.2020.2970175},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/Park20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/PerezRRS20,
  author       = {Salvador P{\'{e}}rez and
                  Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and
                  Shahid Raza and
                  Antonio F. Skarmeta},
  title        = {Application Layer Key Establishment for End-to-End Security in IoT},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {3},
  pages        = {2117--2128},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2959428},
  doi          = {10.1109/JIOT.2019.2959428},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/PerezRRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/SovynKP20,
  author       = {Yaroslav Sovyn and
                  Volodymyr Khoma and
                  Michal Podpora},
  title        = {Comparison of Three CPU-Core Families for IoT Applications in Terms
                  of Security and Performance of {AES-GCM}},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {1},
  pages        = {339--348},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2953230},
  doi          = {10.1109/JIOT.2019.2953230},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/SovynKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isi/MurtyR20,
  author       = {Maturi Sreerama Murty and
                  Nallamothu Nagamalleswara Rao},
  title        = {Stalking the Resources for Security in Linked Data Applications Using
                  Resource Description Framework},
  journal      = {Ing{\'{e}}nierie des Syst{\`{e}}mes d Inf.},
  volume       = {25},
  number       = {6},
  pages        = {793--801},
  year         = {2020},
  url          = {https://doi.org/10.18280/isi.250609},
  doi          = {10.18280/ISI.250609},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isi/MurtyR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JonesJMX20,
  author       = {Kevin I. Jones and
                  Helge Janicke and
                  Leandros A. Maglaras and
                  Christos Xenakis},
  title        = {Introduction to the special issue of the journal of information security
                  and applications on" cyber security in {ICS} {\&} {SCADA} systems"},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102542},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102542},
  doi          = {10.1016/J.JISA.2020.102542},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/JonesJMX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SenM20,
  author       = {Amartya Sen and
                  Sanjay Madria},
  title        = {Application design phase risk assessment framework using cloud security
                  domains},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102617},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102617},
  doi          = {10.1016/J.JISA.2020.102617},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SenM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangZZX20,
  author       = {Min Yang and
                  Shibin Zhang and
                  Hang Zhang and
                  Jinyue Xia},
  title        = {Corrigendum to "A New User Behavior Evaluation Method in Online Social
                  Network" Journal of Information Security and Applications Volume 48
                  {(2019)} 102371},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {50},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2019.102405},
  doi          = {10.1016/J.JISA.2019.102405},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YangZZX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/Sykes20,
  author       = {Edward R. Sykes},
  title        = {A context-aware system using mobile applications and beacons for on-premise
                  security environments},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {11},
  number       = {11},
  pages        = {5487--5511},
  year         = {2020},
  url          = {https://doi.org/10.1007/s12652-020-01906-2},
  doi          = {10.1007/S12652-020-01906-2},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/Sykes20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Schoinianakis20,
  author       = {Dimitrios Schoinianakis},
  title        = {Residue arithmetic systems in cryptography: a survey on modern security
                  applications},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {3},
  pages        = {249--267},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-020-00231-w},
  doi          = {10.1007/S13389-020-00231-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Schoinianakis20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/LiYMLY20,
  author       = {Qianmu Li and
                  XiaoChun Yin and
                  Shunmei Meng and
                  Yaozong Liu and
                  Zijian Ying},
  title        = {A security event description of intelligent applications in edge-cloud
                  environment},
  journal      = {J. Cloud Comput.},
  volume       = {9},
  pages        = {23},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13677-020-00171-0},
  doi          = {10.1186/S13677-020-00171-0},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcloudc/LiYMLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/FangTW20,
  author       = {Weijian Fang and
                  Xiaoling Tan and
                  Dominic Wilbur},
  title        = {Research on machine learning method and its application technology
                  in intrusion information security detection},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {38},
  number       = {2},
  pages        = {1549--1558},
  year         = {2020},
  url          = {https://doi.org/10.3233/JIFS-179518},
  doi          = {10.3233/JIFS-179518},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/FangTW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/Tang20b,
  author       = {Yongjun Tang},
  title        = {Security design and application of Internet of things based on asymmetric
                  encryption algorithm and neural network for {COVID-19}},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {39},
  number       = {6},
  pages        = {8703--8711},
  year         = {2020},
  url          = {https://doi.org/10.3233/JIFS-189266},
  doi          = {10.3233/JIFS-189266},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/Tang20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/RjaibiH20,
  author       = {Walid Rjaibi and
                  Mohammad Hammoudeh},
  title        = {Enhancing and simplifying data security and privacy for multitiered
                  applications},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {139},
  pages        = {53--64},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jpdc.2020.01.006},
  doi          = {10.1016/J.JPDC.2020.01.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/RjaibiH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/StylianopoulosA20,
  author       = {Charalampos Stylianopoulos and
                  Magnus Almgren and
                  Olaf Landsiedel and
                  Marina Papatriantafilou},
  title        = {Multiple pattern matching for network security applications: Acceleration
                  through vectorization},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {137},
  pages        = {34--52},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jpdc.2019.10.011},
  doi          = {10.1016/J.JPDC.2019.10.011},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/StylianopoulosA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/AhmadCCBZ20,
  author       = {Maqsood Ahmad and
                  Valerio Costamagna and
                  Bruno Crispo and
                  Francesco Bergadano and
                  Yury Zhauniarovich},
  title        = {StaDART: Addressing the problem of dynamic code updates in the security
                  analysis of android applications},
  journal      = {J. Syst. Softw.},
  volume       = {159},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jss.2019.07.088},
  doi          = {10.1016/J.JSS.2019.07.088},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/AhmadCCBZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/MadhavapandianM20,
  author       = {S. Madhavapandian and
                  P. Maruthupandi},
  title        = {{FPGA} implementation of highly scalable {AES} algorithm using modified
                  mix column with gate replacement technique for security application
                  in {TCP/IP}},
  journal      = {Microprocess. Microsystems},
  volume       = {73},
  pages        = {102972},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.micpro.2019.102972},
  doi          = {10.1016/J.MICPRO.2019.102972},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/MadhavapandianM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/SucasasMAM20,
  author       = {Victor Sucasas and
                  Georgios Mantas and
                  Saud Althunibat and
                  Jos{\'{e}}{-}Fern{\'{a}}n Mart{\'{\i}}nez{-}Ortega},
  title        = {Editorial: Security and Privacy Protection for Mobile Applications
                  and Platforms},
  journal      = {Mob. Networks Appl.},
  volume       = {25},
  number       = {1},
  pages        = {151--152},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11036-019-01438-w},
  doi          = {10.1007/S11036-019-01438-W},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/SucasasMAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/El-BendaryKHE20,
  author       = {Mohsen A. M. Mohamed Kaseem El{-}Bendary and
                  Hany Kasban and
                  Ayman Haggag and
                  Mostafa A. R. Eltokhy},
  title        = {Investigating of nodes and personal authentications utilizing multimodal
                  biometrics for medical application of WBANs security},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {33-34},
  pages        = {24507--24535},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-020-08926-2},
  doi          = {10.1007/S11042-020-08926-2},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/El-BendaryKHE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/PraveenaR20,
  author       = {D. Praveena and
                  P. Rangarajan},
  title        = {A machine learning application for reducing the security risks in
                  hybrid cloud networks},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {7-8},
  pages        = {5161--5173},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-018-6339-0},
  doi          = {10.1007/S11042-018-6339-0},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/PraveenaR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZhaoLCOL20,
  author       = {Xiaofang Zhao and
                  Shengxin Lin and
                  Xuefang Chen and
                  Chaochao Ou and
                  Chunping Liao},
  title        = {Application of face image detection based on deep learning in privacy
                  security of intelligent cloud platform},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {23-24},
  pages        = {16707--16718},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-019-08014-0},
  doi          = {10.1007/S11042-019-08014-0},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ZhaoLCOL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/WuPL20,
  author       = {Wanqing Wu and
                  Sandeep Pirbhulal and
                  Guanglin Li},
  title        = {Adaptive computing-based biometric security for intelligent medical
                  applications},
  journal      = {Neural Comput. Appl.},
  volume       = {32},
  number       = {15},
  pages        = {11055--11064},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00521-018-3855-9},
  doi          = {10.1007/S00521-018-3855-9},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/WuPL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeLLZCMG20,
  author       = {Daojing He and
                  Shihao Li and
                  Cong Li and
                  Sencun Zhu and
                  Sammy Chan and
                  Weidong Min and
                  Nadra Guizani},
  title        = {Security Analysis of Cryptocurrency Wallets in Android-Based Applications},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {6},
  pages        = {114--119},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.011.2000025},
  doi          = {10.1109/MNET.011.2000025},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeLLZCMG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/KimBMSL20,
  author       = {Hyunbum Kim and
                  Jalel Ben{-}Othman and
                  Lynda Mokdad and
                  Junggab Son and
                  Chunguo Li},
  title        = {Research Challenges and Security Threats to AI-Driven 5G Virtual Emotion
                  Applications Using Autonomous Vehicles, Drones, and Smart Devices},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {6},
  pages        = {288--294},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.011.2000245},
  doi          = {10.1109/MNET.011.2000245},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/KimBMSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/LiSLZW20,
  author       = {Weiwei Li and
                  Zhou Su and
                  Ruidong Li and
                  Kuan Zhang and
                  Yuntao Wang},
  title        = {Blockchain-Based Data Security for Artificial Intelligence Applications
                  in 6G Networks},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {6},
  pages        = {31--37},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.021.1900629},
  doi          = {10.1109/MNET.021.1900629},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/LiSLZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/PirbhulalWMMLA20,
  author       = {Sandeep Pirbhulal and
                  Wanqing Wu and
                  Khan Muhammad and
                  Irfan Mehmood and
                  Guanglin Li and
                  Victor Hugo C. de Albuquerque},
  title        = {Mobility Enabled Security for Optimizing IoT based Intelligent Applications},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {2},
  pages        = {72--77},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.001.1800547},
  doi          = {10.1109/MNET.001.1800547},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/PirbhulalWMMLA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/Blake20,
  author       = {Cindy Blake},
  title        = {Reducing risk with end-to-end application security automation},
  journal      = {Netw. Secur.},
  volume       = {2020},
  number       = {2},
  pages        = {6--8},
  year         = {2020},
  url          = {https://doi.org/10.1016/S1353-4858(20)30019-2},
  doi          = {10.1016/S1353-4858(20)30019-2},
  timestamp    = {Mon, 09 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/Blake20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/HanKM20,
  author       = {Songyang Han and
                  Walter O. Krawec and
                  Fei Miao},
  title        = {A game-theoretic security framework for quantum cryptography: Performance
                  analysis and application},
  journal      = {Quantum Inf. Process.},
  volume       = {19},
  number       = {9},
  pages        = {349},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11128-020-02861-9},
  doi          = {10.1007/S11128-020-02861-9},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/HanKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/VillamizarKGM20,
  author       = {Hugo Villamizar and
                  Marcos Kalinowski and
                  Alessandro F. Garcia and
                  Daniel M{\'{e}}ndez},
  title        = {An efficient approach for reviewing security-related aspects in agile
                  requirements specifications of web applications},
  journal      = {Requir. Eng.},
  volume       = {25},
  number       = {4},
  pages        = {439--468},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00766-020-00338-w},
  doi          = {10.1007/S00766-020-00338-W},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/VillamizarKGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/LombardiLPBJL20,
  author       = {Federico Lombardi and
                  Maurizio Lualdi and
                  Francesco Picetti and
                  Paolo Bestagini and
                  Gerardus Janszen and
                  Luca Angelo Di Landro},
  title        = {Ballistic Ground Penetrating Radar Equipment for Blast-Exposed Security
                  Applications},
  journal      = {Remote. Sens.},
  volume       = {12},
  number       = {4},
  pages        = {717},
  year         = {2020},
  url          = {https://doi.org/10.3390/rs12040717},
  doi          = {10.3390/RS12040717},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/LombardiLPBJL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/MarotMLLBB20,
  author       = {Julien Marot and
                  Claire Migliaccio and
                  J{\'{e}}r{\^{o}}me Lant{\'{e}}ri and
                  Paul Lauga and
                  Salah Bourennane and
                  Laurent Brochier},
  title        = {Joint Design of the Hardware and the Software of a Radar System with
                  the Mixed Grey Wolf Optimizer: Application to Security Check},
  journal      = {Remote. Sens.},
  volume       = {12},
  number       = {18},
  pages        = {3097},
  year         = {2020},
  url          = {https://doi.org/10.3390/rs12183097},
  doi          = {10.3390/RS12183097},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/MarotMLLBB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KhwajaMA20,
  author       = {Amir A. Khwaja and
                  Muniba Murtaza and
                  Hafiz F. Ahmed},
  title        = {A security feature framework for programming languages to minimize
                  application layer vulnerabilities},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.95},
  doi          = {10.1002/SPY2.95},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KhwajaMA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AslanAS20,
  author       = {Bora Aslan and
                  F{\"{u}}sun Yavuzer Aslan and
                  M. Tolga Sakalli},
  title        = {Energy Consumption Analysis of Lightweight Cryptographic Algorithms
                  That Can Be Used in the Security of Internet of Things Applications},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {8837671:1--8837671:15},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8837671},
  doi          = {10.1155/2020/8837671},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AslanAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/MartinVBAS20,
  author       = {Peter G. Martin and
                  Yannick Verbelen and
                  Elia Sciama Bandel and
                  Mark Andrews and
                  Thomas B. Scott},
  title        = {Project Gatekeeper: An Entrance Control System Embedded Radiation
                  Detection Capability for Security Applications},
  journal      = {Sensors},
  volume       = {20},
  number       = {10},
  pages        = {2957},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20102957},
  doi          = {10.3390/S20102957},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/MartinVBAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/OwohS20,
  author       = {Nsikak Pius Owoh and
                  Manmeet Mahinderjit Singh},
  title        = {SenseCrypt: {A} Security Framework for Mobile Crowd Sensing Applications},
  journal      = {Sensors},
  volume       = {20},
  number       = {11},
  pages        = {3280},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20113280},
  doi          = {10.3390/S20113280},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/OwohS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/BashirJZ20,
  author       = {Reem Bashir and
                  Helge Janicke and
                  Wen Zeng},
  title        = {Evaluating the Impact of Sandbox Applications on Live Digital Forensics
                  Investigation},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {25},
  pages        = {e2},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.8-4-2021.169179},
  doi          = {10.4108/EAI.8-4-2021.169179},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/BashirJZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ParkKPK20,
  author       = {SooHyun Park and
                  Yeongeun Kang and
                  Jeman Park and
                  Joongheon Kim},
  title        = {Self-Controllable Super-Resolution Deep Learning Framework for Surveillance
                  Drones in Security Applications},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {23},
  pages        = {e5},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.30-6-2020.165502},
  doi          = {10.4108/EAI.30-6-2020.165502},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/ParkKPK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics