-
1
-
2
-
3
-
4
Computer Network Attacks and Modern International Law
Published 2014-04-01“…States execute CNA's involving its agents or hiring private hacker groups. However, the application of lex lata remains unclear in practice and still undeveloped in doctrine. …”
Get full text
Article -
5
Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data
Published 2025-02-01“…With hackers relentlessly disrupting cyberspace and the day-to-day operations of organizations worldwide, there are also concerns related to Personally Identifiable Information (PII). …”
Get full text
Article -
6
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Published 2021-01-01“…It has been assessed in terms of the guessing attack in real-time deep learning complex IoT applications. …”
Get full text
Article