Linked e-resources

Details

Blockchain and Applications
ChainSCAN: A Blockchain-based Supply Chain Alerting Framework for Food Safety
BlockRAT: An Enhanced Remote Access Trojan Framework via Blockchain
Adapted PBFT Consensus Protocol for Sharded Blockchain
A Practical Blockchain-based Maintenance Record System for Better Aircraft Security
Redactable Blockchain with Fine-Grained Autonomy and Transaction Rollback
Cryptography and Applications
Pitch in: A Secure Extension Signature based on SM9
Verifiable DOPE from Semi-homomorphic Encryption, and the Extension to DOT
Scalable M+1st-Price Auction with Infinite Bidding Price
The Shared Memory based Cryptographic Card Virtualization
Network Security
Feature Transfer based Network Anomaly Detection
Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN
AtNet: A Novel Anti-tracking Network with Multi-party Judgement Capability based on Cross-domain Small-world Topology
A Two-stage Method for Fine-grained DNS Covert Tunnel Behavior Detection
Analysis and Detection against Overlapping Phenomenon of Behavioral Attribute in Network Attacks
Integration of Cybersecurity related Development Processes by using a Quantification Method
Cyber-Physical System
ZoomPass: A Zoom-based Android Unlock Scheme on Smart Devices
Metasploit for Cyber-Physical Security Testing with Real-Time Constraints
Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems
Malware
Malware Classification Based on Semi-Supervised Learning
Malware detected and tell me why: An verifiable malware detection model with graph metric learning
Malware Detection using Automated Generation of Yara rules on Dynamic Features
Mobile System Security
Question Answering Models For Privacy Policies of Mobile Apps: Are We There Yet?
Design of End-to-End Security for MQTT 5.0
DroidFP: A Zero-Permission Detection Framework for Android Device Based on Gated Recurrent Unit
System and Web Security
An Intrusion Detection System based on Deep Belief Networks
HINCDG: Multi-Meta-Path Graph Auto-Encoders for Mining of Weak Association Malicious Domains
AttVAE: A Novel Anomaly Detection Framework for Multivariate Time Series
BASNEA: Threat Hunting for Ethereum Smart Contract based on Backtrackless Aligned-Spatial Network Entity Alignment
Multi-region SRAM-Based TCAM for Longest Prefix
Security in Financial Industry
A solution for the offline double-spending issue of digital currencies
A Hierarchical Macroeconomic Copula Model for Cyber Damages based on current Cyber Insurance Prices
Social Engineering and Personalized Security
Cyber Social Engineering Kill Chain
Towards Practical Personalized Security Nudge Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge Effects
Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement
Privacy and Anonymity
TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps
A k-anonymity-based Robust Watermarking Scheme for Relational Database.

Browse Subjects

Show more subjects...

Statistics

from
to
Export