Cited By
View all- Vasilellis EBotsos VAnagnostopoulou AGritzalis D(2024)Gaming the system: tetromino-based covert channel and its impact on mobile securityInternational Journal of Information Security10.1007/s10207-024-00875-323:4(3007-3027)Online publication date: 1-Aug-2024
- Mundt MBaier H(2024)Enhancing Incident Management by an Improved Understanding of Data Exfiltration: Definition, Evaluation, ReviewDigital Forensics and Cyber Crime10.1007/978-3-031-56580-9_3(33-57)Online publication date: 3-Apr-2024
- Morais RCrocker PLeithardt V(2023)Nero: A Deterministic Leaderless Consensus Algorithm for DAG-Based CryptocurrenciesAlgorithms10.3390/a1601003816:1(38)Online publication date: 7-Jan-2023