An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks
Enhancing Process Control in Industry 4.0 Scenarios using Cyber-Physical Systems
Application Vulnerabilities in Risk Assessment and Management
IP based Wireless Sensor Networks: Performance Analysis using Simulations and Experiments
Technique of Data Visualization: Example of Network Topology Display for Security Monitoring
Scalable extensible middleware framework for context-aware mobile applications (SCAMMP)
A Systematic Approach for Attack Analysis and Mitigation in V2V Networks
Threats from Inside: Dynamic Utility (Mis)Alignments in an Agent based Model