Cited By
View all- Roy PKumar PBhattacharya A(2025)ZeroVCS: An efficient authentication protocol without trusted authority for zero-trust vehicular communication systemsFuture Generation Computer Systems10.1016/j.future.2024.107520163(107520)Online publication date: Feb-2025
- Jawad AAssal HJaskolka J(2024)"I'm Getting Information that I Can Act on Now": Exploring the Level of Actionable Information in Tool-generated Threat ReportsProceedings of the 2024 European Symposium on Usable Security10.1145/3688459.3688467(172-186)Online publication date: 30-Sep-2024
- Kwarteng EKwarteng JBansal NCebe M(2024)Exploring Medical Device Manufacturing Domain Threat Modeling Methodologies: User Perspectives on Security, Privacy and Safety2024 18th International Symposium on Medical Information and Communication Technology (ISMICT)10.1109/ISMICT61996.2024.10738169(22-27)Online publication date: 15-May-2024
- Show More Cited By