Search for "wose" returned 858 results

58 min
Privacy & Stylometry
Practical Attacks Against Authorship Recognition Techniques

60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…

38 min
The impact of quantum computers in cybersecurity
Estimating the costs of algorithms for attacks and defense…

64 min
"Exploit" in theater
post-existentialism is the question, not post-privacy

59 min
Financial surveillance
Exposing the global banking watchlist

45 min