Search

Your search keyword '"Julio Hernandez-Castro"' showing total 30 results

Search Constraints

Start Over You searched for: Author "Julio Hernandez-Castro" Remove constraint Author: "Julio Hernandez-Castro"
30 results on '"Julio Hernandez-Castro"'

Search Results

1. An Empirical Evaluation of Large Language Models in Static Code Analysis for PHP Vulnerability Detection

2. Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps

3. PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone

4. Critical Analysis of Hypothesis Tests in Federal Information Processing Standard (140-2)

5. An in-Depth Study of the Jisut Family of Android Ransomware

6. Smartphone image acquisition forensics using sensor fingerprint

7. System steganalysis with automatic fingerprint extraction.

8. Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns

9. Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts

10. Automatic detection of potentially illegal online sales of elephant ivory via data mining

11. Forensic analysis of video steganography tools

16. An investigation of individual willingness to pay ransomware

19. Personality Types and Ransomware Victimisation

23. A new approach to analyze the independence of statistical tests of randomness

27. Industrialising Blackmail: Privacy Invasion Based IoT Ransomware

28. Security of Ubiquitous Computing Systems : Selected Topics

29. Assessing the extent and nature of wildlife trade on the dark web

30. Weaknesses in ENT Battery Design

Catalog

Books, media, physical & digital resources