Estimation of Signal Coverage and Localization in Wi-Fi Networkswith AODV and OLSRTowards Traffic-Driven VNF Scaling: A Preliminary Case Study based on ContainerA visual analytics approach for the cyber forensics based on different views of the network trafficPPM: Privacy Policy Manager for Home Energy Management SystemA Belief Rule Based Expert System to Predict Earthquake under UncertaintyOn the impossibility of effectively using likely-invariants for software attestation purposesAchieving trustworthy Homomorphic Encryption by combining it with a Trusted Execution EnvironmentThe Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified CompetitionSubliminal Channels in High-Speed SignaturesStopping the Insider at the Gates: Protecting Organizational Assets Through Graph Mining