[HTML][HTML] Between a rock and a hard (ening) place: Cyber insurance in the ransomware era
Cyber insurance and ransomware are two of the most studied areas within security research
and practice to date, and their interplay continues to raise concerns in industry and …
and practice to date, and their interplay continues to raise concerns in industry and …
Literature Review: Misconceptions About Phishing
M Mossano, M Volkamer - International Symposium on Human Aspects of …, 2025 - Springer
Phishing is a danger to both private users and businesses. Industry and academia have
proposed several approaches to deal with this threat, many of which developed with a …
proposed several approaches to deal with this threat, many of which developed with a …
'There was a bit of PTSD every time I walked through the office door': Ransomware harms and the factors that influence the victim organization's experience
Ransomware is a pernicious contemporary cyber threat for organizations, with ransomware
operators intentionally leveraging a range of harms against their victims in order to solicit …
operators intentionally leveraging a range of harms against their victims in order to solicit …
Realizing credible remote agricultural auditing with trusted video technology
The conventional approaches of auditing agricultural commodities from the production and
transportation level to the retailers and consumers often get obstructed by the lack of human …
transportation level to the retailers and consumers often get obstructed by the lack of human …
Simplifying electronic document digital signatures
Electronic documents are typically signed using private keys and the matching digital
certificate through a Public Key Infrastructure (PKI). Private keys must be kept in a safe place …
certificate through a Public Key Infrastructure (PKI). Private keys must be kept in a safe place …
Static and Dynamic Memory Protection using Type-Based Memory Layout in Rust
P Lindgren, P Dzialo, A Nurmi… - 2023 IEEE 2nd Industrial …, 2023 - ieeexplore.ieee.org
Hardware supported memory protection is a commonly adopted approach to runtime
verification of memory accesses. However, protection is typically coarse grained where …
verification of memory accesses. However, protection is typically coarse grained where …