Automating privacy compliance in the decentralized enterpriseGero DittmannChristopher Giblinet al.2022Big Data 2022
Graph Representation Learning based Vulnerable Target Identification in Ransomware AttacksWenqi WeiMu Qiaoet al.2022Big Data 2022