default search action
Security and Communication Networks, Volume 2019
Volume 2019, 2019
- Yubiao Wang, Junhao Wen, Xibin Wang, Bamei Tao, Wei Zhou:
A Cloud Service Trust Evaluation Model Based on Combining Weights and Gray Correlation Analysis. 2437062:1-2437062:11 - Shuang Zhao, Shuhui Chen, Yipin Sun, Zhiping Cai, Jinshu Su:
Identifying Known and Unknown Mobile Application Traffic Using a Multilevel Classifier. 9595081:1-9595081:11 - Xiaoye Li, Jing Yang, Zhenlong Sun, Jianpei Zhang:
Differentially Private Release of the Distribution of Clustering Coefficients across Communities. 2518714:1-2518714:9 - Yuichi Komano, Kazuo Ohta, Kazuo Sakiyama, Mitsugu Iwamoto, Ingrid Verbauwhede:
Single-Round Pattern Matching Key Generation Using Physically Unclonable Function. 1719585:1-1719585:13 - Ángel Martín del Rey, Lu-Xing Yang, Vasileios Karyotis:
Mathematical Models for Malware Propagation. 6046353:1-6046353:2 - Mohamed Ali Hajjaji, Mohamed Gafsi, Abdessalem Ben Abdelali, Abdellatif Mtibaa:
FPGA Implementation of Digital Images Watermarking System Based on Discrete Haar Wavelet Transform. 1294267:1-1294267:17 - Liran Ma, Yan Huo, Chunqiang Hu, Wei Li:
Security and Privacy for Smart Cyber-Physical Systems. 7045862:1-7045862:2 - Ming Xu, Weili Han:
An Explainable Password Strength Meter Addon via Textual Pattern Recognition. 5184643:1-5184643:10 - Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu:
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy. 1816393:1-1816393:12 - Zhenjun Tang, Ye Yang, Shijie Xu, Chunqiang Yu, Xianquan Zhang:
Image Encryption with Double Spiral Scans and Chaotic Maps. 8694678:1-8694678:15 - Rashid Abbasi, Lixiang Xu, Farhan Amin, Bin Luo:
Efficient Lossless Compression Based Reversible Data Hiding Using Multilayered n-Bit Localization. 8981240:1-8981240:13 - Baodong Qin:
Tightly Secure Lossy Trapdoor Functions: Constructions and Applications. 3636759:1-3636759:13 - Xu Wang, Bo Song, Wei Ni, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng:
Group-Based Susceptible-Infectious-Susceptible Model in Large-Scale Directed Networks. 1657164:1-1657164:9 - Yunxue Yan, Lei Wu, Wenyu Xu, Hao Wang, Zhaoman Liu:
Integrity Audit of Shared Cloud Data with Identity Tracking. 1354346:1-1354346:11 - JingJing Wang, Yiliang Han, Xiaoyuan Yang, Tanping Zhou, Jiayong Chen:
A New Group Location Privacy-Preserving Method Based on Distributed Architecture in LBS. 2414687:1-2414687:14 - Yuntao Zhao, Bo Bo, Yongxin Feng, ChunYu Xu, Bo Yu:
A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning. 2674684:1-2674684:8 - Laurence T. Yang, Wei Wang, Gregorio Martínez Pérez, Willy Susilo:
Security, Privacy, and Trust for Cyberphysical-Social Systems. 2964673:1-2964673:2 - Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang:
RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications. 3263902:1-3263902:26 - Viet Cuong Trinh:
A Short Server-Aided Certificateless Aggregate Multisignature Scheme in the Standard Model. 3424890:1-3424890:14 - Wenli Shang, Tianyu Gong, Chunyu Chen, Jing Hou, Peng Zeng:
Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees. 3574675:1-3574675:11 - Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos, Bruno Bogaz Zarpelão:
Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks. 3745619:1-3745619:13 - Teng Hu, Weina Niu, Xiaosong Zhang, Xiaolei Liu, Jiazhong Lu, Yuan Liu:
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning. 3898951:1-3898951:12 - Darong Huang, Lanyan Ke, Bo Mi, Guosheng Wei, Jian Wang, Shaohua Wan:
A Cooperative Denoising Algorithm with Interactive Dynamic Adjustment Function for Security of Stacker in Industrial Internet of Things. 4049765:1-4049765:16 - Jian Sun, Guanhua Huang, Arun Kumar Sangaiah, Guangyang Zhu, Xiaojiang Du:
Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective. 4074272:1-4074272:15 - Toan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong:
Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment. 4250743:1-4250743:11 - Yasuyuki Kawanishi, Hideaki Nishihara, Daisuke Souma, Hirotaka Yoshida, Yoichi Hata:
A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design. 4614721:1-4614721:35 - Bin Ma, Bing Li, Xiao-Yu Wang, Chunpeng Wang, Jian Li, Yun-Qing Shi:
Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image. 4732632:1-4732632:9 - Soultana Ellinidou, Gaurav Sharma, Théo Rigas, Tristan Vanspouwen, Olivier Markowitch, Jean-Michel Dricot:
SSPSoC: A Secure SDN-Based Protocol over MPSoC. 4869167:1-4869167:11 - Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski:
Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System. 4930908:1-4930908:22 - Dhanu Dwiardhika, Takuji Tachibana:
Virtual Network Embedding Based on Security Level with VNF Placement. 5640134:1-5640134:11 - Jin Wook Byun:
A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function. 5935292:1-5935292:15 - Han Zhang, Yuanbo Guo, Tao Li:
Multifeature Named Entity Recognition in Information Security Based on Adversarial Learning. 6417407:1-6417407:9 - Marcin Luckner:
Practical Web Spam Lifelong Machine Learning System with Automatic Adjustment to Current Lifecycle Phase. 6587020:1-6587020:16 - Maurantonio Caprolu, Simone Raponi, Roberto Di Pietro:
FORTRESS: An Efficient and Distributed Firewall for Stateful Data Plane SDN. 6874592:1-6874592:16 - Guoyan Huang, Qian Wang, Xinqian Liu, Xiaobing Hao, Huaizhi Yan:
Mining the Key Nodes from Software Network Based on Fault Accumulation and Propagation. 7140480:1-7140480:11 - Hyun-A. Park:
Secure Information Sharing System for Online Patient Networks. 7541269:1-7541269:16 - Haiying Ma, Zhanjun Wang, Zhijin Guan:
Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation. 8093578:1-8093578:11 - Édgar Salguero Dorokhin, Walter Fuertes, Edison Lascano:
On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key. 8214681:1-8214681:10 - Wenting Shen, Jing Qin, Jixin Ma:
A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment. 8275074:1-8275074:15 - Yong-Seok Lee, Young-Ho Seo, Dong-Wook Kim:
Blind Image Watermarking Based on Adaptive Data Spreading in n-Level DWT Subbands. 8357251:1-8357251:11 - Jiadong Ren, Zhangqi Zheng, Qian Liu, Zhiyao Wei, Huaizhi Yan:
A Buffer Overflow Prediction Approach Based on Software Metrics and Machine Learning. 8391425:1-8391425:13 - Meiyu Zhang, Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan:
SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks. 8690853:1-8690853:12 - Fute Shang, Buhong Wang, Fuhu Yan, Tengyao Li:
Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems. 8936784:1-8936784:11 - Gustav Sourek, Filip Zelezný:
Efficient Extraction of Network Event Types from NetFlows. 8954914:1-8954914:18 - Mingfu Xue, Chengxiang Yuan, Zhe Liu, Jian Wang:
SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations. 9795621:1-9795621:18 - Yu Zhou, Yongzhuang Wei, Fengrong Zhang:
Measuring the Sum-of-Squares Indicator of Boolean Functions in Encryption Algorithm for Internet of Things. 1348639:1-1348639:15 - Joseph I. Choi, Kevin R. B. Butler:
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities. 1368905:1-1368905:28 - Vasyl Ustimenko, Urszula Romanczuk-Polubiec, Aneta Wróblewska, Monika Katarzyna Polak, Eustrat Zhupa:
On the Constructions of New Symmetric Ciphers Based on Nonbijective Multivariate Maps of Prescribed Degree. 2137561:1-2137561:15 - Hefeng Chen, Chin-Chen Chang:
A Novel (t, n) Secret Sharing Scheme Based upon Euler's Theorem. 2387358:1-2387358:7 - Haitao Song, Guangming Tang, Yifeng Sun, Zhanzhan Gao:
Security Measure for Image Steganography Based on High Dimensional KL Divergence. 3546367:1-3546367:13 - SeokHwan Choi, Jin-Myeong Shin, Yoon-Ho Choi:
Dynamic Nonparametric Random Forest Using Covariance. 3984031:1-3984031:12 - Nelson Ochieng, Waweru Mwangi, Ismail Ateya:
Optimizing Computer Worm Detection Using Ensembles. 4656480:1-4656480:10 - Yuntao Zhao, ChunYu Xu, Bo Bo, Yongxin Feng:
MalDeep: A Deep Learning Classification Framework against Malware Variants Based on Texture Visualization. 4895984:1-4895984:11 - Wenjie Liu, Peipei Gao, Zhihao Liu, Hanwu Chen, Maojun Zhang:
A Quantum-Based Database Query Scheme for Privacy Preservation in Cloud Environment. 4923590:1-4923590:14 - Jieren Cheng, Mengyang Li, Xiangyan Tang, Victor S. Sheng, Yifu Liu, Wei Guo:
Corrigendum to "Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing". 6809054:1 - Kevser Ovaz Akpinar, Ibrahim Özçelik:
Corrigendum to "Development of the ECAT Preprocessor with the Trust Communication Approach". 7457154:1 - Zhaoqing Pan, Ching-Nung Yang, Victor S. Sheng, Naixue Xiong, Weizhi Meng:
Machine Learning for Wireless Multimedia Data Security. 7682306:1-7682306:2 - Tran Khanh Dang, Khanh T. K. Tran:
The Meeting of Acquaintances: A Cost-Efficient Authentication Scheme for Light-Weight Objects with Transient Trust Level and Plurality Approach. 8123259:1-8123259:18 - Mahmoud Abu-Zant, Adwan Yasin:
Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV). 8249108:1-8249108:12 - Young-Seob Jeong, Jiyoung Woo, Ah Reum Kang:
Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks. 8485365:1-8485365:9 - Lei He, Jianfeng Ma, Ruo Mo, Dawei Wei:
Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing. 8583130:1-8583130:12 - Junhyoung Oh, Ukjin Lee, Kyungho Lee:
Usability Evaluation Model for Biometric System considering Privacy Concern Based on MCDM Model. 8715264:1-8715264:14 - Tianbo Lu, Ting Meng, Chao Li, Guozhen Dong, Huiyang Li, Jiao Zhang, Xiaoyan Zhang:
MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication. 9078176:1-9078176:15 - Federica Lago, Quoc-Tin Phan, Giulia Boato:
Visual and Textual Analysis for Image Trustworthiness Assessment within Online News. 9236910:1-9236910:14 - Yinqiao Xiong, Peidong Zhu, Zhizhu Liu, Hui Yin, Tiantian Deng:
EPLC: An Efficient Privacy-Preserving Line-Loss Calculation Scheme for Residential Areas of Smart Grid. 9637578:1-9637578:14 - Hoang-Nam Pham-Nguyen, Quang Tran Minh:
Dynamic Resource Provisioning on Fog Landscapes. 1798391:1-1798391:15 - Amirreza Niakanlahiji, Jafar Haadi Jafarian:
WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense. 2156906:1-2156906:13 - Ping Wang, Bin Li, Hongjin Shi, Yaosheng Shen, Ding Wang:
Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments. 2516963:1-2516963:13 - Yujiao Song, Hao Wang, Xiaochao Wei, Lei Wu:
Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud. 3249726:1-3249726:9 - Xuyun Zhang, Yuan Yuan, Zhili Zhou, Shancang Li, Lianyong Qi, Deepak Puthal:
Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things. 4529757:1-4529757:4 - Baosheng Wang, Yi Wang, Rongmao Chen:
A Practical Authentication Framework for VANETs. 4752612:1-4752612:11 - Libing Wu, Jing Wang, Sherali Zeadally, Debiao He:
Anonymous and Efficient Message Authentication Scheme for Smart Grid. 4836016:1-4836016:12 - E. Munivel, Kannammal Annadurai:
New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing. 5141395:1-5141395:11 - Yu Zhang, Yin Li, Yifan Wang:
Secure and Efficient Searchable Public Key Encryption for Resource Constrained Environment Based on Pairings under Prime Order Group. 5280806:1-5280806:14 - Leila Khatibzadeh, Zarrintaj Bornaee, Abbas Ghaemi Bafghi:
Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic. 5306395:1-5306395:11 - Mohamed Amine Ferrag, Leandros A. Maglaras, Abdelouahid Derhab:
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends. 5452870:1-5452870:20 - Ankang Ju, Yuanbo Guo, Ziwei Ye, Tao Li, Jing Ma:
HeteMSD: A Big Data Analytics Framework for Targeted Cyber-Attacks Detection Using Heterogeneous Multisource Data. 5483918:1-5483918:9 - Ye Yuan, Liji Wu, Yijun Yang, Xiangmin Zhang:
Erratum to "A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism". 5742308:1-5742308:2 - Jizhi Wang:
The Prediction of Serial Number in OpenSSL's X.509 Certificate. 6013846:1-6013846:11 - Hala Abu Dhailah, Eyad Taqieddin, Abdallah Y. Alma'aitah:
An Enhanced and Resource-Aware RFID Multitag Grouping Protocol. 6862052:1-6862052:15 - Jiaji Pan, Yi-Ning Liu, Weiming Zhang:
Detection of Dummy Trajectories Using Convolutional Neural Networks. 8431074:1-8431074:12 - Rui Zhu, Li Xu, Yali Zeng, Xun Yi:
Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification. 9126376:1-9126376:12 - Neline van Ginkel, Willem De Groef, Fabio Massacci, Frank Piessens:
A Server-Side JavaScript Security Architecture for Secure Integration of Third-Party Libraries. 9629034:1-9629034:21 - Peyman Jafary, Antti Supponen, Mikko Salmenperä, Sami Repo:
Analyzing Reliability of the Communication for Secure and Highly Available GOOSE-Based Logic Selectivity. 9682189:1-9682189:16 - Hojoong Park, Yongjin Yeom, Ju-Sung Kang:
A Lightweight BCH Code Corrector of TRNG with Measurable Dependence. 9684239:1-9684239:11 - Qian Lu, Haipeng Qu, Yuzhan Ouyang, Jiahui Zhang:
SLFAT: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames. 2718741:1-2718741:10 - Sanghoon Lee, Ik Rae Jeong:
A Cancelable Template for the Low-Quality Fingerprints from Wearable Devices. 4202671:1-4202671:8 - Quanbo Qu, Baocang Wang, Yuan Ping, Zhili Zhang:
Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme. 8319508:1-8319508:6 - Mengxia Shuai, Bin Liu, Nenghai Yu, Ling Xiong:
Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks. 8145087:1-8145087:14 - Yong Xie, Songsong Zhang, Xiang Li, Yanggui Li, Yuan Chai:
CasCP: Efficient and Secure Certificateless Authentication Scheme for Wireless Body Area Networks with Conditional Privacy-Preserving. 5860286:1-5860286:13 - Yu Zhan, Baocang Wang:
Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network. 6059834:1-6059834:5 - Kaifan Huang, Pengdeng Li, Lu-Xing Yang, Xiaofan Yang, Yuan Yan Tang:
Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach. 2315627:1-2315627:12 - Wei Bai, Zhisong Pan, Shize Guo, Zhe Chen:
RMMDI: A Novel Framework for Role Mining Based on the Multi-Domain Information. 8085303:1-8085303:15 - Yu Liu, Xiaolei Liu, Yanmin Zhao:
Security Cryptanalysis of NUX for the Internet of Things. 2062697:1-2062697:12 - Jiazhong Lu, Fengmao Lv, Zhongliu Zhuo, Xiaosong Zhang, Xiaolei Liu, Teng Hu, Wei Deng:
Integrating Traffics with Network Device Logs for Anomaly Detection. 5695021:1-5695021:10 - Jiadong Ren, Jiawei Guo, Qian Wang, Yuan Huang, Hao Xiaobing, Hu Jingjing:
Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms. 7130868:1-7130868:11 - Hisham A. Kholidy, Abdelkarim Erradi:
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems. 6816943:1-6816943:15 - Wei Sun, Hao Zhang, Li-jun Cai, Ai-min Yu, Jinqiao Shi, Jian-Guo Jiang:
A Novel Device Identification Method Based on Passive Measurement. 6045251:1-6045251:11 - Thein Than Thwin, Sangsuree Vasupongayya:
Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems. 8315614:1-8315614:15 - Feifei Wang, Guoai Xu, Chenyu Wang, Junhao Peng:
A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment. 2838615:1-2838615:15 - Chao Yang, Junwei Zhang, Jingjing Guo, Yu Zheng, Li Yang, Jianfeng Ma:
Fingerprint Protected Password Authentication Protocol. 1694702:1-1694702:12 - Chenghai Li, Fangzheng Zhao, Chen Liu, Lei Lei, Jie Zhang:
A Hyperchaotic Color Image Encryption Algorithm and Security Analysis. 8132547:1-8132547:8 - Dawen Xu, Shubing Su:
Separable Reversible Data Hiding in Encrypted Images Based on Difference Histogram Modification. 7480147:1-7480147:14 - Binrui Zhu, Jiameng Sun, Jing Qin, Jixin Ma:
A Secure Data Sharing Scheme with Designated Server. 4268731:1-4268731:16 - Harry Bartlett, Ed Dawson, Hassan Qahur Al Mahri, Md. Iftekhar Salam, Leonie Simpson, Kenneth Koon-Ho Wong:
Random Fault Attacks on a Class of Stream Ciphers. 1680263:1-1680263:12 - Jae Yeol Jeong, Ik Rae Jeong:
Efficient Cancelable Iris Template Generation for Wearable Sensors. 7473591:1-7473591:13 - Qinglan Zhao, Shuntong Yang, Dong Zheng, Baodong Qin:
A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things. 8105787:1-8105787:8 - Tao Wang, Bo Yang, Guoyong Qiu, Lina Zhang, Yong Yu, Yanwei Zhou, Juncai Guo:
An Approach Enabling Various Queries on Encrypted Industrial Data Stream. 6293970:1-6293970:12 - Zeeshan Ali Khan, Peter Herrmann:
Recent Advancements in Intrusion Detection Systems for the Internet of Things. 4301409:1-4301409:19 - Qihua Wang, Huaqun Wang, Yufeng Wang, Rui Guo:
A Distributed Access Control with Outsourced Computation in Fog Computing. 6782753:1-6782753:10 - Bo Feng, Qiang Li, Yuede Ji, Dong Guo, Xiangyu Meng:
Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users. 3053418:1-3053418:14 - Ashwag Albakri, Lein Harn, Sejun Song:
Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN). 3950129:1-3950129:11 - Markus Heinrich, Tsvetoslava Vateva-Gurova, Tolga Arul, Stefan Katzenbeisser, Neeraj Suri, Henk Birkholz, Andreas Fuchs, Christoph Krauß, Maria Zhdanova, Don Kuzhiyelil, Sergey Tverdyshev, Christian Schlehuber:
Security Requirements Engineering in Safety-Critical Railway Signalling Networks. 8348925:1-8348925:14 - Dan Lu, Qilong Han, Kejia Zhang, Haitao Zhang, Bisma Gull:
A Novel Method for Location Privacy Protection in LBS Applications. 1914038:1-1914038:11 - Jie Cai, Han Jiang, Pingyuan Zhang, Zhihua Zheng, Hao Wang, Guangshi Lü, Qiuliang Xu:
ID-Based Strong Designated Verifier Signature over ℛ-SIS Assumption. 9678095:1-9678095:8 - Zhuoqun Xia, Zhenwei Fang, Fengfei Zou, Jin Wang, Arun Kumar Sangaiah:
Research on Defensive Strategy of Real-Time Price Attack Based on Multiperson Zero-Determinant. 6956072:1-6956072:13 - Zhen Qu, Ivan B. Djordjevic:
Comment on "Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment". 1484593:1 - Madiha Khalid, Umar Mujahid Khokhar, Muhammad Najam-ul-Islam:
Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags. 3295616:1-3295616:25 - Daniel Schneider, Jens Braband, Erwin Schoitsch, Sascha Uhrig, Stefan Katzenbeisser:
Safety and Security Coengineering in Embedded Systems. 5381856:1-5381856:2 - Omar Iraqi, Hanan El Bakkali:
Application-Level Unsupervised Outlier-Based Intrusion Detection and Prevention. 8368473:1-8368473:13 - Kenan Kingsley Phiri, Hyunsung Kim:
Linear (t, n) Secret Sharing Scheme with Reduced Number of Polynomials. 5134534:1-5134534:16 - Yaojun Hao, Fuzhi Zhang, Jian Wang, Qingshan Zhao, Jianfang Cao:
Detecting Shilling Attacks with Automatic Features from Multiple Views. 6523183:1-6523183:13 - Abd Elghaffar M. Elhady, Hazem M. El-Bakry, Ahmed Abou Elfetouh:
Comprehensive Risk Identification Model for SCADA Systems. 3914283:1-3914283:24 - Olawale Surajudeen Adebayo, Normaziah Abdul Aziz:
Improved Malware Detection Model with Apriori Association Rule and Particle Swarm Optimization. 2850932:1-2850932:13 - Mingyong Yin, Xingshu Chen, Qixu Wang, Wei Wang, Yulong Wang:
Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT. 6803801:1-6803801:14 - Feifei Wang, Guoai Xu, Lize Gu:
A Secure and Efficient ECC-Based Anonymous Authentication Protocol. 4656281:1-4656281:13 - Yanping Shen, Kangfeng Zheng, Chunhua Wu, Yixian Yang:
A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection. 1283495:1-1283495:9 - Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Takahiro Matsuda, Kazuma Ohara, Kazumasa Omote, Yusuke Sakai:
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions. 4872403:1-4872403:36 - Yunpeng Gao, Nan Zhang:
Social Security and Privacy for Social IoT Polymorphic Value Set: A Solution to Inference Attacks on Social Networks. 5498375:1-5498375:16 - Ping Qi, Fucheng Wang, Shu Hong:
A Novel Trust Model Based on Node Recovery Technique for WSN. 2545129:1-2545129:12 - Pelin Angin, Bharat K. Bhargava, Rohit Ranchal:
Big Data Analytics for Cyber Security. 4109836:1-4109836:2 - Paolo Santini, Giuseppe Gottardi, Marco Baldi, Franco Chiaraluce:
A Data-Driven Approach to Cyber Risk Assessment. 6716918:1-6716918:8 - Haiyan Xu, Zhaoxin Zhang, Jianen Yan, Xin Ma:
Evaluating the Impact of Name Resolution Dependence on the DNS. 8565397:1-8565397:12 - Zhuo Zhang, Guangyuan Fu, Fuqiang Di, Changlong Li, Jia Liu:
Generative Reversible Data Hiding by Image-to-Image Translation via GANs. 4932782:1-4932782:10 - Jinrong Bai, Qibin Shi, Shiguang Mu:
A Malware and Variant Detection Method Using Function Call Graph Isomorphism. 1043794:1-1043794:12 - Cheng Huang, Jiaxuan Han, Xing Zhang, Jiayong Liu:
Automatic Identification of Honeypot Server Using Machine Learning Techniques. 2627608:1-2627608:8 - Emre Gürbüz, Güzin Ulutas, Mustafa Ulutas:
Detection of Free-Form Copy-Move Forgery on Digital Images. 8124521:1-8124521:14 - Mariusz Kamola:
Sensitivity of Importance Metrics for Critical Digital Services Graph to Service Operators' Self-Assessment Errors. 7510809:1-7510809:8 - Woorim Bang, Ji Won Yoon:
Power Grid Estimation Using Electric Network Frequency Signals. 1982168:1-1982168:11 - Lin Zhang, Li Li, Eric Medwedeff, Haiping Huang, Xiong Fu, Ruchuan Wang:
Privacy Protection of Social Networks Based on Classified Attribute Encryption. 9108759:1-9108759:14 - Yingxu Lai, Jingwen Zhang, Zenghui Liu:
Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network. 8124254:1-8124254:11 - Bo Han, Yinliang Zhao, Changpeng Zhu:
An Object Proxy-Based Dynamic Layer Replacement to Protect IoMT Applications. 2798571:1-2798571:9 - Chuan Yu, Shuhui Chen, Zhiping Cai:
LTE Phone Number Catcher: A Practical Attack against Mobile Privacy. 7425235:1-7425235:10 - Daegeon Kim, Huy Kang Kim:
Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis. 6268476:1-6268476:10 - Dan Yamamoto, Wakaha Ogata:
Multidivisible Online/Offline Cryptography and Its Application to Signcryptions. 1042649:1-1042649:21 - En Zhang, Jun-Zhe Zhu, Gong-Li Li, Jian Chang, Yu Li:
Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation. 6989383:1-6989383:8 - Francisco Sales de Lima Filho, Frederico Augusto Fernandes Silveira, Agostinho de Medeiros Brito Júnior, Genoveva Vargas-Solar, Luiz Felipe Q. Silveira:
Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning. 1574749:1-1574749:15 - Haisheng Yu, Keqiu Li, Heng Qi:
An Active Controller Selection Scheme for Minimizing Packet-In Processing Latency in SDN. 1949343:1-1949343:11 - Mi-Jung Choi, Jiwon Bang, Jongwook Kim, Hajin Kim, Yang-Sae Moon:
All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis. 5278137:1-5278137:16 - Baek Kyung Song, Joon Soo Yoo, Miyeon Hong, Ji Won Yoon:
A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms. 3648671:1-3648671:14 - Hefeng Chen, Hsiao-Ling Wu, Chin-Chen Chang, Long-Sheng Chen:
Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data. 9060756:1-9060756:7 - Konstantinos Rantos, George Drosatos, Antonios Kritsas, Christos Ilioudis, Alexandros Papanikolaou, Adam P. Filippidis:
A Blockchain-Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem. 1431578:1-1431578:15 - Jiaye Pan, Yi Zhuang, Binglin Sun:
Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs. 8467081:1-8467081:22 - Weiping Wang, Feng Zhang, Xi Luo, Shigeng Zhang:
PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks. 2595794:1-2595794:15 - Muhammad Zain ul Abideen, Shahzad Saleem, Madiha Ejaz:
VPN Traffic Detection in SSL-Protected Channel. 7924690:1-7924690:17 - Rameez Asif, William J. Buchanan:
Corrigendum to "Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment". 2637028:1 - Mohammad Faisal, Sohail Abbas, Haseeb Ur Rahman, Muhammad Zahid Khan, Arif Ur Rahman:
An Analysis of DDoS Attacks on the Instant Messengers. 1751285:1-1751285:8 - Jun Wang, Feixiang Luo, Zequan Zhou, Xiling Luo, Zhen Wang:
Optimistic Fair Exchange in Cloud-Assisted Cyber-Physical Systems. 5175076:1-5175076:14 - Shuaiwei Zhang, Xiaoyuan Yang, Lin Chen, Weidong Zhong:
A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition. 6124165:1-6124165:10 - Yi Zhao, Kaitai Liang, Bo Yang, Liqun Chen:
CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs. 8357241:1-8357241:8 - Junwei Tang, Jingjing Li, Ruixuan Li, Hongmu Han, Xiwu Gu, Zhiyong Xu:
SSLDetecter: Detecting SSL Security Vulnerabilities of Android Applications Based on a Novel Automatic Traversal Method. 7193684:1-7193684:20 - Pyung-Han Kim, Eun-Jun Yoon, Kwan-Woo Ryu, Ki-Hyun Jung:
Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images. 9038650:1-9038650:11 - Muhua Liu, Ping Zhang, Qingtao Wu:
A Novel Construction of Constrained Verifiable Random Functions. 4187892:1-4187892:15 - Yahong Xu, Geng Yang, Shuangjie Bai:
Laplace Input and Output Perturbation for Differentially Private Principal Components Analysis. 9169802:1-9169802:10 - Dong Wang, Xiaosong Zhang, Ting Chen, Jingwei Li:
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface. 5076324:1-5076324:19 - Ping Zhang, Yamin Li, Muhua Liu:
An Indistinguishably Secure Function Encryption Scheme. 8567534:1-8567534:10 - A. Karimi Rizi, Mohammad Naderi Dehkordi, N. Nemat bakhsh:
SNI: Supervised Anonymization Technique to Publish Social Networks Having Multiple Sensitive Labels. 8171263:1-8171263:23 - Weina Niu, Ting Li, Xiaosong Zhang, Teng Hu, Tianyu Jiang, Heng Wu:
Using XGBoost to Discover Infected Hosts Based on HTTP Traffic. 2182615:1-2182615:11 - Xin Ma, Shize Guo, Wei Bai, Jun Chen, Shiming Xia, Zhisong Pan:
An API Semantics-Aware Malware Detection Method Based on Deep Learning. 1315047:1-1315047:9 - Dainius Ceponis, Nikolaj Goranin:
Evaluation of Deep Learning Methods Efficiency for Malicious and Benign System Calls Classification on the AWSCTD. 2317976:1-2317976:12 - Bin Yu, Zhengxin Fu, Sijia Liu:
A Novel Three-Layer QR Code Based on Secret Sharing Scheme and Liner Code. 7937816:1-7937816:13 - Sijie Fan, Yaqun Zhao:
Analysis of DES Plaintext Recovery Based on BP Neural Network. 9580862:1-9580862:5 - Ignazio Pedone, Antonio Lioy, Fulvio Valenza:
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions. 2425983:1-2425983:11 - Claudio Urrea, Claudio Morales:
Enhancing Modbus-RTU Communications for Smart Metering in Building Energy Management Systems. 7010717:1-7010717:8 - Langtao Hu, Xin Zheng, Chunsheng Chen:
Physical Layer Security in Nonorthogonal Multiple Access Wireless Network with Jammer Selection. 7869317:1-7869317:9 - Marwan Ali Albahar:
Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments. 8939041:1-8939041:9 - Yibin Xu, Yangyu Huang:
MWPoW: Multiple Winners Proof of Work Protocol, a Decentralisation Strengthened Fast-Confirm Blockchain Protocol. 3674274:1-3674274:13 - Lin Ding, Lei Wang, Dawu Gu, Chenhui Jin, Jie Guan:
Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping. 7429320:1-7429320:5 - R. B. Benisha, S. Raja Ratna:
Design of Intrusion Detection and Prevention in SCADA System for the Detection of Bias Injection Attacks. 1082485:1-1082485:12 - Yixin Wu, Yuqiang Sun, Cheng Huang, Peng Jia, Luping Liu:
Session-Based Webshell Detection Using Machine Learning in Web Logs. 3093809:1-3093809:11 - Dimitrios Kosmanos, Antonios Argyriou, Leandros A. Maglaras:
Estimating the Relative Speed of RF Jammers in VANETs. 2064348:1-2064348:18 - Hui Gao, Yunfang Chen, Wei Zhang:
Detection of Trojaning Attack on Neural Networks via Cost of Sample Classification. 1953839:1-1953839:12 - Xiaohu Liu, Hengwei Zhang, Yuchen Zhang, Lulu Shao, Jihong Han:
Active Defense Strategy Selection Method Based on Two-Way Signaling Game. 1362964:1-1362964:14 - Chen Pan, Guodong Ye, Xiaoling Huang, Junwei Zhou:
Novel Meaningful Image Encryption Based on Block Compressive Sensing. 6572105:1-6572105:12 - Imran Shahzad, Qaiser Mushtaq, Abdul Razaq:
Construction of New S-Box Using Action of Quotient of the Modular Group for Multimedia Security. 2847801:1-2847801:13 - Jiageng Chen, Chunhua Su, Zheng Yan:
AI-Driven Cyber Security Analytics and Privacy Protection. 1859143:1-1859143:2 - Quanrun Li, Ching-Fang Hsu, Kim-Kwang Raymond Choo, Debiao He:
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks. 7871067:1-7871067:13 - Ankang Chu, Yingxu Lai, Jing Liu:
Industrial Control Intrusion Detection Approach Based on Multiclassification GoogLeNet-LSTM Model. 6757685:1-6757685:11 - Jiaqing Mo, Hang Chen:
A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks. 2136506:1-2136506:17 - Aysha Shabbir, Maryam Shabbir, Muhammad Rizwan, Fahad Ahmad:
Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard. 2509898:1-2509898:16 - Huicong Liang, Meiqin Wang:
Cryptanalysis of the Lightweight Block Cipher BORON. 7862738:1-7862738:12 - Guofeng Lin, Yunhao Xia, Chun Ying, Zhixin Sun:
F2P-ABS: A Fast and Secure Attribute-Based Signature for Mobile Platforms. 5380710:1-5380710:12 - Mee Lan Han, Byung Il Kwak, Huy Kang Kim:
CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis. 1901548:1-1901548:21 - Yuchen Zhang, Jing Liu:
Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning. 3038586:1-3038586:16 - Lin Li, Chin-Chen Chang, Hefeng Chen:
An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy. 3031506:1-3031506:17 - Jingang Liu, Yongge Wang, Zongxiang Yi, Zhiqiang Lin:
polarRLCE: A New Code-Based Cryptosystem Using Polar Codes. 3086975:1-3086975:10 - Jianping Zeng, Shuang Wu, Yanyu Chen, Rui Zeng, Chengrong Wu:
Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge Processing. 2031063:1-2031063:16 - Zhidong Shen, Yuhao Zhang, Weiying Chen:
A Bayesian Classification Intrusion Detection Method Based on the Fusion of PCA and LDA. 6346708:1-6346708:11 - Abdulrahman Al-Dailami, Chang Ruan, Zhihong Bao, Tao Zhang:
QoS3: Secure Caching in HTTPS Based on Fine-Grained Trust Delegation. 3107543:1-3107543:16 - Tran Nghi Phu, Kien Hoang Dang, Dung Ngo Quoc, Nguyen Dai Tho, Nguyen Ngoc Binh:
A Novel Framework to Classify Malware in MIPS Architecture-Based IoT Devices. 4073940:1-4073940:13 - Bohun Kim, Junghoon Cho, Byungjun Choi, Jongsun Park, Hwajeong Seo:
Compact Implementations of HIGHT Block Cipher on IoT Platforms. 5323578:1-5323578:10
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.