Linked e-resources

Details

Part I. Cryptocurrencies and Blockchain
Attacking with Bitcoin: Using Bitcoin to Build Resilient Botnet Armies
Blockchain-Based Systems in Land Registry, A Survey of Their Use and Economic Implications
The Evolution of Privacy in the Blockchain: A Historical Survey
The evolution of privacy in the blockchain: a historical survey
Securing Cryptoasset Insurance Services with Multisignatures
Building an Ethereum-Based Decentralized Vehicle Rental System
Part II Machine Learning
Off-Line Writer Verification Using Segments of Handwritten Samples and SVM
A Comparative Study to Detect Flowmeter Deviations Using One-Class Classifiers
IoT Device Identification Using Deep Learning
Impact of Current Phishing Strategies in Machine Learning Models for Phishing Detection
Crime Prediction for Patrol Routes Generation Using Machine Learning
Part III. Applications
Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud
Short Message Multichannel Broadcast Encryption
Cybersecurity Overview of a Robot as a Service Platform
Probabilistic and Timed Analysis of Security Protocols
Domain Knowledge: Predicting the Kind of Content Hosted by a Domain
Evidence Identification and Acquisition Based on Network Link in an Internet of Things Environment
Proposition of Innovative and Scalable Information System for Call Detail Records Analysis and Visualisation
Automatic Detection of Sensitive Information in Educative Social Networks
Part IV. Special Session: Fake News Detection and Prevention
Detection of Artificial Images and Changes in Real Images Using Convolutional Neural Networks
Distributed Architecture for Fake News Detection
Multi-stage News-Stance Classification Based on Lexical and Neural Features
Fake news direction
Application of the BERT-Based Architecture in Fake News Detection
Part V. Special Session: Mathematical Methods and Models in Cybersecurity
Simulating Malware Propagation with Different Infection Rates
A Data Quality Assessment Model and Its Application to Cybersecurity Data Sources
Towards Forecasting Time-Series of Cyber-Security Data Aggregates
Hybrid Approximate Convex Hull One-Class Classifier for an Industrial Plant
Part VI. Special Session: Measurements for a Dynamic Cyber-risk Assessment
Traceability and Accountability in Autonomous Agents
The Order of the Factors DOES Alter the Product: Cyber Resilience Policies' Implementation Order
Deep Learning Defenses Against Adversarial Examples for Dynamic Risk Assessment
A New Approach for Dynamic and Risk-Based Data Anonymization
Part VII. Special Session: Cybersecurity in a Hybrid Quantum World
An Innovative Linear Complexity Computation for Cryptographic Sequences
Randomness Analysis for GSS-sequences Concatenated
Study of the Reconciliation Mechanism of NewHope
Securing Blockchain with Quantum Safe Cryptography: When and How?
Blockchain in Education: New Challenges
Part VIII. Special Session: Anomaly/Intrusion Detection
Impact of Generative Adversarial Networks on NetFlow-Based Traffic Classification
Hybrid Model for Improving the Classification Effectiveness of Network Intrusion Detection
Adaptive Approach for Density-Approximating Neural Network Models for Anomaly Detection
Systematic Mapping of Detection Techniques for Advanced Persistent Threats
Neural Network Analysis of PLC Traffic in Smart City Street Lighting Network
Beta-Hebbian Learning for Visualizing Intrusions in Flows
Detecting Intrusion via Insider Attack in Database Transactions by Learning Disentangled Representation with Deep Metric Neural Network.

Browse Subjects

Show more subjects...

Statistics

from
to
Export