Most Cited & Viewed

Most Cited & Viewed Papers

Citations Article
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
by Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos and Dimitrios Tsolis
 
Cyberattacks in Smart Grids: Challenges and Solving the Multi-Criteria Decision-Making for Cybersecurity Options, Including Ones That Incorporate Artificial Intelligence, Using an Analytical Hierarchy Process
by Ayat-Allah Bouramdane
 
Image Encryption Algorithms: A Survey of Design and Evaluation Metrics
by Yousef Alghamdi and Arslan Munir
 
Security in Cloud-Native Services: A Survey
by Theodoros Theodoropoulos, Luis Rosa, Chafika Benzaid, Peter Gray, Eduard Marin, Antonios Makris, Luis Cordeiro, Ferran Diego, Pavel Sorokin, Marco Di Girolamo, Paolo Barone, Tarik Taleb and Konstantinos Tserpes
 
A Dynamic and Adaptive Cybersecurity Governance Framework
by Henock Mulugeta Melaku
 
Protection of Personal Data in the Context of E-Commerce
by Zlatan Morić, Vedran Dakic, Daniela Djekic and Damir Regvart
 
Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review
by Abdul Majeed
 
Cybersecurity for AI Systems: A Survey
by Raghvinder S. Sangwan, Youakim Badr and Satish M. Srinivasan
 
Data Privacy and Ethical Considerations in Database Management
by Eduardo Pina, José Ramos, Henrique Jorge, Paulo Váz, José Silva, Cristina Wanzeller, Maryam Abbasi and Pedro Martins
 
Potential of Homomorphic Encryption for Cloud Computing Use Cases in Manufacturing
by Raphael Kiesel, Marvin Lakatsch, Alexander Mann, Karl Lossie, Felix Sohnius and Robert H. Schmitt
Views Article
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
by Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos and Dimitrios Tsolis
Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations
by Vedran Dakić, Zlatan Morić, Ana Kapulica and Damir Regvart
Protection of Personal Data in the Context of E-Commerce
by Zlatan Morić, Vedran Dakic, Daniela Djekic and Damir Regvart
Cyberattacks in Smart Grids: Challenges and Solving the Multi-Criteria Decision-Making for Cybersecurity Options, Including Ones That Incorporate Artificial Intelligence, Using an Analytical Hierarchy Process
by Ayat-Allah Bouramdane
Data Privacy and Ethical Considerations in Database Management
by Eduardo Pina, José Ramos, Henrique Jorge, Paulo Váz, José Silva, Cristina Wanzeller, Maryam Abbasi and Pedro Martins
A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies
by Khalid Bennouk, Nawal Ait Aali, Younès El Bouzekri El Idrissi, Bechir Sebai, Abou Zakaria Faroukhi and Dorra Mahouachi
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape
by Anastasios Papathanasiou, George Liontos, Vasiliki Liagkou and Euripidis Glavas
Image Encryption Algorithms: A Survey of Design and Evaluation Metrics
by Yousef Alghamdi and Arslan Munir
A Dynamic and Adaptive Cybersecurity Governance Framework
by Henock Mulugeta Melaku
Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy Experimentation
by Jack Kolenbrander, Ethan Husmann, Christopher Henshaw, Elliott Rheault, Madison Boswell and Alan J. Michaels
Downloads Article
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
by Anastasios Giannaros, Aristeidis Karras, Leonidas Theodorakopoulos, Christos Karras, Panagiotis Kranias, Nikolaos Schizas, Gerasimos Kalogeratos and Dimitrios Tsolis
A Dynamic and Adaptive Cybersecurity Governance Framework
by Henock Mulugeta Melaku
Cyberattacks in Smart Grids: Challenges and Solving the Multi-Criteria Decision-Making for Cybersecurity Options, Including Ones That Incorporate Artificial Intelligence, Using an Analytical Hierarchy Process
by Ayat-Allah Bouramdane
Protection of Personal Data in the Context of E-Commerce
by Zlatan Morić, Vedran Dakic, Daniela Djekic and Damir Regvart
Cybersecurity for AI Systems: A Survey
by Raghvinder S. Sangwan, Youakim Badr and Satish M. Srinivasan
Data Privacy and Ethical Considerations in Database Management
by Eduardo Pina, José Ramos, Henrique Jorge, Paulo Váz, José Silva, Cristina Wanzeller, Maryam Abbasi and Pedro Martins
Security in Cloud-Native Services: A Survey
by Theodoros Theodoropoulos, Luis Rosa, Chafika Benzaid, Peter Gray, Eduard Marin, Antonios Makris, Luis Cordeiro, Ferran Diego, Pavel Sorokin, Marco Di Girolamo, Paolo Barone, Tarik Taleb and Konstantinos Tserpes
Image Encryption Algorithms: A Survey of Design and Evaluation Metrics
by Yousef Alghamdi and Arslan Munir
A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies
by Khalid Bennouk, Nawal Ait Aali, Younès El Bouzekri El Idrissi, Bechir Sebai, Abou Zakaria Faroukhi and Dorra Mahouachi
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape
by Anastasios Papathanasiou, George Liontos, Vasiliki Liagkou and Euripidis Glavas
Back to TopTop