Linked e-resources
Details
Table of Contents
Blockchain-based Outsourcing Shared Car Risk Prediction Scheme Design
Fairness Protection Method of Vickery Auction Based on Smart Contract
An Improved Needham-Schroeder Session Key Distribution Protocol For In-Vehicle CAN Network
Research on Two-Party Cooperative Aigis-sig Digital Signature Protocol
An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection
A Lightweight PSIS Scheme Based on Multi-Node Collaboration in the IoT
SAD: Website Fingerprint Defense based on Adversarial Examples
A privacy-aware and time-limited data access control scheme with large universe and public traceability for Cloud-based IoD
Multi-Party High-Dimensional Related Data Publishing via Probabilistic Principal Component Analysis and Differential Privacy
ource code vulnerability detection method with multidimensional representation
A Security Enhanced Verification Framework Based on Device Fingerprint in Internet of Things
RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient
Linear Policy Recommender Scheme for Large-Scale Attribute-based Access Control
Non-interactive Privacy-preserving Naive Bayes Classifier Using Homomorphic Encryption
BA-Audit: blockchain-based public auditing for aggregated data sharing in edge-assisted IoT
Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System
Threat Detection-Oriented Network Security Situation Assessment Method
System Business Affecting Impact Analysis Method with Crossover Probability Theory
RAP: A Lightweight Application Layer Defense against Website Fingerprinting
FL-iotDP: Differential Private Federated Neural Network
Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing
Honeywords Generation Method Based on Deep Learning and Rule-based Password Attack
Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning
GLV/GLS Scalar Multiplication on Twisted Edwards Curves
Online Privacy of Personal Information - Perceptions v Reality
ARTPHIL: Reversible de-identification of free-text using an integrated model Bayan
CAFM: Precise Classication for Android Family Malware.
Fairness Protection Method of Vickery Auction Based on Smart Contract
An Improved Needham-Schroeder Session Key Distribution Protocol For In-Vehicle CAN Network
Research on Two-Party Cooperative Aigis-sig Digital Signature Protocol
An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection
A Lightweight PSIS Scheme Based on Multi-Node Collaboration in the IoT
SAD: Website Fingerprint Defense based on Adversarial Examples
A privacy-aware and time-limited data access control scheme with large universe and public traceability for Cloud-based IoD
Multi-Party High-Dimensional Related Data Publishing via Probabilistic Principal Component Analysis and Differential Privacy
ource code vulnerability detection method with multidimensional representation
A Security Enhanced Verification Framework Based on Device Fingerprint in Internet of Things
RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient
Linear Policy Recommender Scheme for Large-Scale Attribute-based Access Control
Non-interactive Privacy-preserving Naive Bayes Classifier Using Homomorphic Encryption
BA-Audit: blockchain-based public auditing for aggregated data sharing in edge-assisted IoT
Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System
Threat Detection-Oriented Network Security Situation Assessment Method
System Business Affecting Impact Analysis Method with Crossover Probability Theory
RAP: A Lightweight Application Layer Defense against Website Fingerprinting
FL-iotDP: Differential Private Federated Neural Network
Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing
Honeywords Generation Method Based on Deep Learning and Rule-based Password Attack
Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning
GLV/GLS Scalar Multiplication on Twisted Edwards Curves
Online Privacy of Personal Information - Perceptions v Reality
ARTPHIL: Reversible de-identification of free-text using an integrated model Bayan
CAFM: Precise Classication for Android Family Malware.