tag:joss.theoj.org,2005:/papers/reviewed_by/@gradvohlJournal of Open Source Software2023-06-20T12:25:23ZJournal of Open Source Softwarehttps://joss.theoj.orgtag:joss.theoj.org,2005:Paper/41082023-06-20T12:25:23Z2023-06-21T00:01:18ZPII-Codex: a Python library for PII detection, categorization, and severity assessmentaccepted0.4.32022-12-30 15:44:56 UTC862023-06-20 12:25:23 UTC820235402EidanJ.RosadoCollege of Computing and Engineering, Nova Southeastern University, Fort Lauderdale, FL 33314, USA0000-0003-0665-098X10.21105/joss.05402https://doi.org/10.5281/zenodo.8053039Jupyter Notebook, Pythonhttps://joss.theoj.org/papers/10.21105/joss.05402.pdfPII, PII topology, risk categories, personal identifiable informationtag:joss.theoj.org,2005:Paper/33242022-07-08T15:43:16Z2022-07-09T00:01:12ZTrackerControl: Transparency and Choice around App TrackingacceptedVersion 20220205022022-02-05 13:26:51 UTC752022-07-08 15:43:16 UTC720224270KonradKollnigDepartment of Computer Science, University of Oxford0000-0002-7412-8731NigelShadboltDepartment of Computer Science, University of Oxford0000-0002-5085-972410.21105/joss.04270https://doi.org/10.5281/zenodo.6645297Java, C, SCSShttps://joss.theoj.org/papers/10.21105/joss.04270.pdfmobile apps, Android, tracking, dynamic analysis, network traffic, VPNtag:joss.theoj.org,2005:Paper/31542022-01-18T21:06:42Z2022-01-19T16:21:54ZUnishox: A hybrid encoder for Short Unicode Stringsaccepted1.0.12021-11-04 13:19:56 UTC692022-01-18 21:06:42 UTC720223919ArundaleRamanathanIndependent Researcher0000-0001-6642-447X10.21105/joss.03919https://doi.org/10.5281/zenodo.5800408C++, Chttps://joss.theoj.org/papers/10.21105/joss.03919.pdfcompression, encoding, string-compressiontag:joss.theoj.org,2005:Paper/22872021-06-16T13:01:31Z2021-06-17T00:00:43Zsboxgates: A program for finding low gate count implementations of S-boxesacceptedv1.1.02020-12-28 13:25:35 UTC622021-06-16 13:01:31 UTC620212946MarcusDansarieSwedish Defence University, University of Skövde, Sweden0000-0001-9246-026310.21105/joss.02946https://doi.org/10.5281/zenodo.4954685C, C++https://joss.theoj.org/papers/10.21105/joss.02946.pdfS-box, cryptographytag:joss.theoj.org,2005:Paper/22102021-05-20T08:14:33Z2021-05-21T00:00:35ZMagicwand: A platform to provide high-quality, reliable, and reproducible data sets for low-and-slow DDoS attacks.acceptedv1.0.02020-11-30 19:18:42 UTC612021-05-20 08:14:33 UTC620213032BanjoObayomiTwo Six LabsChristopherH.ToddTwo Six LabsLucasCadalzoTwo Six LabsDavidKillianTwo Six LabsAnthonyC.WongUnaffiliated10.21105/joss.03032https://doi.org/10.5281/zenodo.4774301Pythonhttps://joss.theoj.org/papers/10.21105/joss.03032.pdfCybersecurity, Network Traffic, Distributed Denial of Service, DDoS, LSDDoS, Machine Learningtag:joss.theoj.org,2005:Paper/12872020-02-17T12:56:27Z2021-02-15T11:31:31ZMDL Suite: A language, generator and compiler for describing mazesaccepted1.02019-10-11 12:37:43 UTC462020-02-17 12:56:27 UTC520201815AkashNagDept. of Computer Science, M.U.C. Women's College0000-0003-0363-269810.21105/joss.01815https://doi.org/10.5281/zenodo.3666101Javahttps://joss.theoj.org/papers/10.21105/joss.01815.pdfmaze, markup language, maze generator, compiler, maze description languagetag:joss.theoj.org,2005:Paper/9902019-08-27T16:23:23Z2021-02-15T11:32:12ZmTower: Trusted Execution Environment for MCU-based devicesacceptedv0.12019-05-07 10:09:05 UTC402019-08-27 16:23:23 UTC420191494TarasA.DrozdovskyiSamsung R&D Institute Ukraine, Kiev, Ukraine0000-0002-4651-1696OleksandrS.MoliavkoSamsung R&D Institute Ukraine, Kiev, Ukraine0000-0003-3167-983X10.21105/joss.01494https://doi.org/10.5281/zenodo.3366076C, C++, Assemblyhttps://joss.theoj.org/papers/10.21105/joss.01494.pdfARM, TrustZone, Trusted Execution Environment, embedded systems, microcontrollers