Hiding Data in a Switched Network
Securely Offloading Computation to the Edge with the Tangle Cache
Automating the Generation of Cyber Range Virtual Scenarios with VSDL
Use of smart devices by the elderly: Nursing home residents in Slovenia
Universal Redactable Blockchain
Information Security Risks Analysis and Assessment in the Passenger-Autonomous Vehicle Interaction
Android Adware Detection using Soot and CFG