default search action
EAI Endorsed Transactions on Security and Safety, Volume 7
Volume 7, Number 23, 2020
- Afsah Anwar, Aminollah Khormali, Jinchun Choi, Hisham Alasmary, Saeed Salem, DaeHun Nyang, David Mohaisen:
Measuring the Cost of Software Vulnerabilities. e1 - Mingxin Sun, Wenjie Wang, Hantao Feng, Hongu Sun, Yuqing Zhang:
Identify Vulnerability Fix Commits Automatically Using Hierarchical Attention Network. e2 - Alem Fitwi, Meng Yuan, Seyed Yahya Nikouei, Yu Chen:
Minor Privacy Protection by Real-time Children Identification and Face Scrambling at the Edge. e3 - Yuan He, Wengjie Wang, Hongyu Sun, Yuqing Zhang:
Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone. e4 - SooHyun Park, Yeongeun Kang, Jeman Park, Joongheon Kim:
Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications. e5
Volume 7, Number 24, 2021
- Mazen Al-Wadi, Amro Awad:
Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories. e1 - Najmudin Saqib, Vasileios Germanos, Wen Zeng, Leandros Maglaras:
Mapping of the Security Requirements of GDPR and NISD. e2 - Tianrou Xia, Yuanyi Sun, Sencun Zhu, Zeeshan Rasheed, Khurram Shafique:
Toward A Network-Assisted Approach for Effective Ransomware Detection. e3 - Deeraj Nagothu, Yu Chen, Alexander J. Aved, Erik Blasch:
Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge. e4 - Wanping Liu, Zhoulan Zhang, Cheng Huang, Yong Fang:
CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers. e5
Volume 7, Number 25, 2020
- Friday Ehi Ikuero, Vasileios Germanos, Laurence Brooks, Wen Zeng:
Is E-voting Systems based on Blockchain Technology Efficient in Nigeria General Elections? e1 - Reem Bashir, Helge Janicke, Wen Zeng:
Evaluating the Impact of Sandbox Applications on Live Digital Forensics Investigation. e2 - M. A. Hannan Bin Azhar, Robert Vause Whitehead:
A study of user experiences and network analysis on anonymity and traceability of bitcoin transactions. e3 - Van Trieu-Do, Richard Garcia-Lebron, Maochao Xu, Shouhuai Xu, Yusheng Feng:
Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study. e4 - Li Wang:
Shoal: A Network Level Moving Target Defense Engine with Software Defined Networking. e5
Volume 7, Number 26, 2020
- Yixin Li, Liming Wang, Jing Yang, Zhen Xu, Xi Luo:
deMSF: a Method for Detecting Malicious Server Flocks for Same Campaign. e1 - Chunling Han, Rui Xue:
Aggregation for Privately Trained Different Types of Local Models. e2 - Lanhang Li, Yuling Luo, Shubin Tang, Lvchen Cao, Xue Ouyang:
Image encryption algorithm using chaotic maps and cellular automata. e3 - Jing Zhang, Yu Wen:
Malware Detection Based on Opcode Dynamic Analysis. e4 - Yan Liu:
User Identity Linkage Method Based on User Online Habit. e5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.