Blind software-assisted conformance and security assessment of FIDO2/WebAuthn implementationsMulti-Channel Subset Iteration with Minimal Loss in Available Capacity (MC-SIMLAC) Algorithm for Joint Forecasting-Scheduling in the Internet of ThingsMechanisms of Authentication toward Habitude Pattern Lock and ECG: An overviewPartial Paving Strategy: Application to optimize the Area Coverage Problem in Mobile Wireless Sensor NetworksDetection Of Computational Intensive Reversible Covert Channels Based On Packet RuntimePrivacy-Preserving Analysis for Remote Video Anomaly Detection in Real Life EnvironmentsInformation Security Risks Analysis and Assessment in the Passenger-Autonomous Vehicle InteractionEmpirical Validation on the Usability of Security Reports for Patching TLS Misconfigurations: User- and Case-Studies on Actionable MitigationsArchitecture of a fake news detection system combining digital watermarking, signal processing, and machine learningSCADA Cybersecurity Awareness and Teaching with Hardware-In-The-Loop Platforms