Blind software-assisted conformance and security assessment of FIDO2/WebAuthn implementations
Privacy-Preserving Analysis for Remote Video Anomaly Detection in Real Life Environments
Hunting cyberattacks: experience from the real backbone network
Design of Robot Plotter Software for Making Pattern with Turtle Graphics Algorithm
Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime
Hierarchical Parallel Processing for Data Clustering in GPU Using Deep Nearest Neighbor Searching