• Towards a cloud consumers credibility assessment and trust management of cloud services

  • NIS directive: The case of Greece

  • The performance analysis of public key cryptography-based authentication

  • An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks

  • VaultIME: Regaining User Control for Password Managers through Auto-correction

  • Human-centered strategies for cyber-physical systems security

  • An Energy-Efficient Localization-Based Geographic Routing Protocol for Underwater Wireless Sensor Networks

  • Application Scheme of PKI System in Wireless Medical Data Transmission Network

  • One Division-Multiplexed of Control Code Based on Quantum Secure Direct Communication

  • A Markov Decision Based Optimization on Bundle Size over Two-Hop Inter-satellite Links