As the value of digital assets continues to grow, so too does the risk landscape. Threat research and attack labs are working ...
Abstract: Using a mobile phone or other portable device to conduct financial transactions online is known as “mobile banking.” Activities such as verifying one's account balance, transferring funds to ...
Edge devices across multiple applications share common attack vectors. Security functionality must be designed in from the ...
Abstract: There has been significant recent research on secure control problems that arise from the open and complex real-world industrial environments. This paper focuses on addressing the issue of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results