Title: Dark Web Intelligence and OSINT Techniques, Author: Azhar ul Haque Sario
Title: Cybersecurity: 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, Rennes, France, June 18-19, 2025, Proceedings, Author: Isabel Praça
Title: Monero-Kryptowährung: Die Zukunft privater digitaler Transaktionen, Author: Fouad Sabry
Title: Cyber Insecurity: Examining the Past, Defining the Future, Author: Vladas Leonas
Title: Foundations and Practice of Security: 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9-11, 2024, Revised Selected Papers, Part II, Author: Kamel Adi
Title: Applied Cryptography and Network Security: 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part II, Author: Marc Fischlin
Title: Applied Cryptography and Network Security: 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part I, Author: Marc Fischlin
Title: AI-Enabled Threat Intelligence and Cyber Risk Assessment, Author: Edlira Martiri
Title: Security and Privacy: 3rd International Conference, ICSP 2024, Jamshedpur, India, November 20-21, 2024, Proceedings, Author: Sihem Mesnager
Title: Computers and Their Applications: 40th International Conference, CATA 2025, San Francisco, CA, USA, March 17-18, 2025, Proceedings, Author: Ajay Bandi
Title: Code-Based Cryptography: 12th International Workshop, CBCrypto 2024, Zurich, Switzerland, May 25-26, 2024, Revised Selected Papers, Author: Violetta Weger
Title: Advancements in Cybersecurity: Next-Generation Systems and Applications, Author: Agbotiname Lucky Imoize
Title: Everyday Cryptography: Fundamental Principles and Applications, Author: Keith M. Martin
Title: Privacy and Identity Management. Generating Futures: 19th IFIP WG 9.6/11.7 and IFIP WG 11.6 International Summer School, Privacy and Identity 2024, Madrid, Spain, September 10-13, 2024, Revised Selected Papers, Author: Felix Bieker
Title: 6G Cyber Security Resilience: Trends and Challenges, Author: H. L. Gururaj
Title: Cyber Risk Management in Practice: A Guide to Real-World Solutions, Author: Carlos Morales
Title: Security Technologies for Law Enforcement Agencies, Author: Kazim Duraklar
Title: Cybersicherheit in kritischen Infrastrukturen: Ein spieltheoretischer Zugang, Author: Stefan Rass
Title: Penetrationstests erfolgreich umsetzen: Praxisleitfaden - Regulatorik - KI-Einflüsse, Author: Nina Wagner
Title: Human Factor Security and Safety: A Behavioral Computing Approach, Author: Cheng Wang

Pagination Links