Wearables that constantly collect various sensor data of their users inc...
Researchers help operators of vulnerable and non-compliant internet serv...
In the era of large-scale internet scanning, misconfigured websites are ...
Misconfigurations and outdated software are a major cause of compromised...
Near-Field Communication (NFC) is being used in a variety of
security-cr...
Due to the increase in natural disasters in the past years, Disaster Res...
Reproducibility and realistic datasets are crucial for advancing researc...
The Internet of Things (IoT) demands authentication systems which can pr...
Today, online privacy is the domain of regulatory measures and
privacy-e...
The Authentication and Authorization for Constrained Environments (ACE)
...