ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2412.17329
  4. Cited By
v1v2 (latest)

SoK: The Design Paradigm of Safe and Secure Defaults

23 December 2024
Jukka Ruohonen
    SILM
ArXiv (abs)PDFHTML

Papers citing "SoK: The Design Paradigm of Safe and Secure Defaults"

15 / 15 papers shown
Title
A Mapping Analysis of Requirements Between the CRA and the GDPR
Jukka Ruohonen
Kalle Hjerppe
Eun-Young Kang
84
5
0
03 Mar 2025
Vulnerability Coordination Under the Cyber Resilience Act
Vulnerability Coordination Under the Cyber Resilience Act
Jukka Ruohonen
Paul Timmers
112
4
0
09 Dec 2024
Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing
  Replay Attack Vulnerabilities on Consumer IoT Devices
Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices
Sara Lazzaro
Vincenzo De Angelis
A. Mandalari
Francesco Buccafurri
62
9
0
22 Jan 2024
From Dragondoom to Dragonstar: Side-channel Attacks and Formally
  Verified Implementation of WPA3 Dragonfly Handshake
From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake
Daniel De Almeida Braga
Natalia Kulatova
M. Sabt
Pierre-Alain Fouque
K. Bhargavan
AAML
45
2
0
18 Jul 2023
Mysterious and Manipulative Black Boxes: A Qualitative Analysis of
  Perceptions on Recommender Systems
Mysterious and Manipulative Black Boxes: A Qualitative Analysis of Perceptions on Recommender Systems
Jukka Ruohonen
78
5
0
20 Feb 2023
SROS2: Usable Cyber Security Tools for ROS 2
SROS2: Usable Cyber Security Tools for ROS 2
Víctor Mayoral-Vilches
Ruffin White
Gianluca Caiazza
Mikael Arguedas
124
25
0
04 Aug 2022
Evaluation of Runtime Monitoring for UAV Emergency Landing
Evaluation of Runtime Monitoring for UAV Emergency Landing
Joris Guérin
Kevin Delmas
Jérémie Guiochet
63
13
0
07 Feb 2022
KGSecConfig: A Knowledge Graph Based Approach for Secured Container
  Orchestrator Configuration
KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration
Mubin Ul Haque
M. M. Kholoosi
Muhammad Ali Babar
40
13
0
21 Dec 2021
Tortured phrases: A dubious writing style emerging in science. Evidence
  of critical issues affecting established journals
Tortured phrases: A dubious writing style emerging in science. Evidence of critical issues affecting established journals
G. Cabanac
C. Labbé
A. Magazinov
DeLMO
118
86
0
12 Jul 2021
Coding Practices and Recommendations of Spring Security for Enterprise
  Applications
Coding Practices and Recommendations of Spring Security for Enterprise Applications
Mazharul Islam
Sazzadur Rahaman
Na Meng
Behnaz Hassanshahi
P. Krishnan
Danfeng
D. Yao
30
11
0
28 Jul 2020
Testing And Hardening IoT Devices Against the Mirai Botnet
Testing And Hardening IoT Devices Against the Mirai Botnet
Christopher Kelly
Nikolaos Pitropakis
Sean McKeown
Costas Lambrinoudakis
21
22
0
27 Jul 2020
A Comprehensive Approach to Abusing Locality in Shared Web Hosting
  Servers
A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers
Seyed Ali Mirheidari
Sajjad Arshad
Saeidreza Khoshkdahan
R. Jalili
45
8
0
02 Nov 2018
High-level Cryptographic Abstractions
High-level Cryptographic Abstractions
Christopher Kane
Bo Lin
Saksham Chand
Scott D. Stoller
Yanhong A. Liu
57
8
0
22 Oct 2018
Secure Coding Practices in Java: Challenges and Vulnerabilities
Secure Coding Practices in Java: Challenges and Vulnerabilities
Na Meng
Stefan Nagy
D. Yao
Wenjie Zhuang
Gustavo A. Arango-Argoty
SILM
42
142
0
28 Sep 2017
Danger is My Middle Name: Experimenting with SSL Vulnerabilities in
  Android Apps
Danger is My Middle Name: Experimenting with SSL Vulnerabilities in Android Apps
Lucky Onwuzurike
Emiliano De Cristofaro
67
68
0
04 May 2015
1