There exist several data-driven approaches that enable us model time ser...
To understand how end-users conceptualize consequences of cyber security...
The problem of detecting phishing emails through machine learning techni...
Sonification is the science of communication of data and events to users...
Online reviews play an integral part for success or failure of businesse...
We present an exploratory study of responses from 75 security profession...
Customers represent their satisfactions of consuming products by sharing...
Cloud computing offers users scalable platforms and low resource cost. A...
The detection of zero-day attacks and vulnerabilities is a challenging
p...