Security Assessment and Evaluation of VPNs: A Comprehensive Survey
February 18, 2025
ACM Computing Surveys - Volume 55, Issue 13s
Forensic analysis of image deletion applications
February 18, 2025
Multimedia Tools and Applications - Pages 1-28
A survey on Common Criteria (CC) evaluating schemes for security assessment of IT products
February 18, 2025
PeerJ Computer Science - Volume 7, Article Number e701
Analytical study of hardware-rooted security standards and their implementation techniques in mobile
February 18, 2025
Telecommunication Systems - Volume 74, Pages 379-403
Integrated Security, Safety, and Privacy Risk Assessment Framework for Medical Devices
February 18, 2025
IEEE Journal of Biomedical and Health Informatics - Volume: 24 , Issue: 6 , Pages 1752-1761
Framework for Calculating Return on Security Investment (ROSI) for Security Oriented Organizations
February 18, 2025
Future Generation Computer Systems - Volume 95, Pages 754-763
Defence Against PUE Attacks in Ad hoc Cognitive Radio Networks: A Mean Field Game Approach
February 18, 2025
Telecommunication Systems - Volume: 70 Issue: 1 Pages: 123-140 Published: JAN 2019
Forensic Investigation of User's Web Activity on Google Chrome using various Forensic Tools
February 18, 2025
International Journal of Computer Science and Network Security - Volume: 16, Issue: 9, Pages123-132
Cyber Security: An Essential Element of National Security
February 18, 2025
Pakistan Army Green Book - Pages 1-26