Article
Publicly Available
Frontmatter
Published/Copyright:
April 6, 2022
Published Online: 2022-04-06
Published in Print: 2022-04-26
© 2022 Walter de Gruyter GmbH, Berlin/Boston
Articles in the same Issue
- Frontmatter
- Editorial
- Guest editorial: Information security methodology and replication studies
- Articles
- Replication study challenges and new number formats for chaotic pseudo random number generators
- Exploring syntactical features for anomaly detection in application logs
- Extracting network based attack narratives through use of the cyber kill chain: A replication study
- Distinguished Dissertations
- Privacy-preserving Web single sign-on: Formal security analysis and design
- Towards practical privacy-preserving protocols
- Self-Portrayals of GI Junior Fellows
- Industrial analytics – An overview
- Enabling data-centric AI through data quality management and data literacy
- Towards Human-Centered AI: Psychological concepts as foundation for empirical XAI research
Articles in the same Issue
- Frontmatter
- Editorial
- Guest editorial: Information security methodology and replication studies
- Articles
- Replication study challenges and new number formats for chaotic pseudo random number generators
- Exploring syntactical features for anomaly detection in application logs
- Extracting network based attack narratives through use of the cyber kill chain: A replication study
- Distinguished Dissertations
- Privacy-preserving Web single sign-on: Formal security analysis and design
- Towards practical privacy-preserving protocols
- Self-Portrayals of GI Junior Fellows
- Industrial analytics – An overview
- Enabling data-centric AI through data quality management and data literacy
- Towards Human-Centered AI: Psychological concepts as foundation for empirical XAI research