YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NETWORKS
DATA PRIVACY AND DIGITAL RIGHTS: PROTECTING PRIVACY THROUGH LAW SURVEILLANCE AND CONSENT
GUARDIANS OF THE DIGITAL REALM: MAPPING KEY STAKEHOLDERS IN DATA PRIVACY AND DIGITAL CREDIT UNIVERSE
OPTIMIZING IDENTITY MANAGEMENT: KEY STRATEGIES FOR EFFECTIVE GOVERNANCE AND ADMINISTRATION
OBJECT CAPABILITY MODEL FOR TEE: A CHERI BASED COMPARTMENTALIZATION APPROACH
DEEP LEARNING MEETS BLOCKCHAIN FOR AUTOMATED AND SECURE ACCESS CONTROL
THE PERFORMANCE COMPARISON OF A BRUTEFORCE PASSWORD CRACKING ALGORITHM USING REGULAR FUNCTIONS AND GENERATOR FUNCTIONS IN PYTHON
A TRUST MANAGEMENT FRAMEWORK FOR VEHICULAR AD HOC NETWORKS
HOW REVERSIBILITY DIFFERENTIATES CYBER FROM KINETIC WARFARE: A CASE STUDY IN THE ENERGY SECTOR
TECHNICAL ANALYSIS ON THE CYBER ORGANIZATIONAL CRIMINOLOGY OF DICTATORIAL MILITARY CONDUCTS -- EXPERIENCE FROM HUMAN TRAFFICKING AND COERCIONS BY MILITARY CYBER AGGRESSIONS
EMULATING TRUSTED PLATFORM MODULE 2.0 ON RASPBERRY PI 2
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
EMERGING SECURITY RISKS OF E-HAIL TRANSPORT SERVICES: FOCUS ON UBER TAXI IN NAIROBI, KENYA
DE-IDENTIFICATION OF PROTECTED HEALTH INFORMATION PHI FROM FREE TEXT IN MEDICAL RECORDS
MANAGING THE INFORMATION SECURITY ISSUES OF ELECTRONIC MEDICAL RECORDS