default search action
EAI Endorsed Transactions on Security and Safety, Volume 4
Volume 4, Number 11, December 2017
- Zheng Tan, Cheng Wang, Xiaoling Fu, Jipeng Cui, Changjun Jiang, Weili Han:
Re-identification of Vehicular Location-Based Metadata. e1 - Yongfeng Li, Jinbin Ouyang, Bing Mao, Kai Ma, Shanqing Guo:
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks. e2 - Nicolas Van Balen, Christopher T. Ball, Haining Wang:
Analysis of Targeted Mouse Movements for Gender Classification. e3 - Subramaniyam Kannan, Paul Wood, Somali Chaterji, Saurabh Bagchi, Larry Deatrick, Patricia Beane:
MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks. e4 - Nicolae Paladi, Christian Gehrmann:
Bootstrapping trust in software defined networks. e5
Volume 4, Number 12, December 2017
- Sencun Zhu, Kevin I. Jones, Leandros A. Maglaras:
Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems. e1 - Quamar Niyaz, Weiqing Sun, Ahmad Y. Javaid:
A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN). e2 - Qi Dong, Zekun Yang, Yu Chen, Xiaohua Li, Kai Zeng:
Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs. e3 - Leixiao Cheng, Quanshui Wu, Yunlei Zhao:
Compact lossy and all-but-one trapdoor functions from lattice. e4 - Cristian Liviu Leca:
Overview of Romania 802.11Wireless Security & Statistics. e5
Volume 4, Number 13, January 2018
- Sencun Zhu, Kevin I. Jones, Leandros A. Maglaras:
Defence Mechanisms for Public Systems. e1 - Mohammad Karami, An Wang, Songqing Chen:
Attribution of Economic Denial of Sustainability Attacks in Public Clouds. e2 - Xiaoyan Sun, Jun Dai, Anoop Singhal, Peng Liu:
Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud. e3 - Chu Huang, Sencun Zhu, Yi Yang:
An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process. e4 - Lei Xu, Lin Chen, Zhimin Gao, Shouhuai Xu, Weidong Shi:
Efficient Public Blockchain Client for Lightweight Users. e5
Volume 4, Number 14, May 2018
- Leandros Maglaras, George Drivas, Kleanthis Noou, Stylianos Rallis:
NIS directive: The case of Greece. e1 - Kaiqi Xiong:
The performance analysis of public key cryptography-based authentication. e2 - Zheng Wang, Shui Yu, Scott Rose:
An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks. e3 - Le Guan, Sadegh Farhang, Yu Pu, Pinyao Guo, Jens Grossklags, Peng Liu:
VaultIME: Regaining User Control for Password Managers through Auto-correction. e4 - Ebrima N. Ceesay, K. Myers, Paul A. Watters:
Human-centered strategies for cyber-physical systems security. e5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.