The software product is a source of cyber-attacks that target organizati...
Machine learning algorithms are used to construct a mathematical model f...
In the last few years, serious games have become popular, with a consens...
This paper proposes a portable hardware token for user authentication, i...
The complexity of today's supply chain, organised in several tiers and
i...
The use of asynchronous design approaches to construct digital signal
pr...