Linked e-resources

Details

Cyber Threats and Defence
DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting
SIEMA: Bringing Advanced Analytics to Legacy Security Information and Event Management
Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces
Towards Automated Assessment of Vulnerability Exposures in Security Operations
Repeatable Experimentation for Cybersecurity Moving Target Defense
MPD: Moving Target Defense through Communication Protocol Dialects
Blockchain and P2P Security 7 GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy Networks
n Extensive Security Analysis on Ethereum Smart Contracts
A Distributed Ledger for Non-Attributable Cyber Threat Intelligence Exchange
AI and Security/Privacy 10 Understanding ff for Differential Privacy in Differencing Attack Scenarios
ToFi: An Algorithm to Defend against Byzantine Attacks in Federated Learning
TESLAC: Accelerating Lattice-based Cryptography with AI Accelerator
Research of CPA Attack Methods based on Ant Colony Algorithm
Local Model Privacy-preserving Study for Federated Learning
Applied Cryptography 16 Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Non-interactive Fault Recovery
Cryptonomial: A Framework for Private Time-Series Polynomial Calculations
Provably Secure Contact Tracing with Conditional Private Set Intersection
Origin Attribution of RSA Public Keys
Network Security 20 Fine-grained Intra-domain Bandwidth Allocation against DDoS Attack.

Browse Subjects

Show more subjects...

Statistics

from
to
Export