Linked e-resources

Details

AI for Network Security
Vulnerability Detection Using Deep Learning Based Function Classification
RAIDER: Reinforcement-aided Spear Phishing Detector
Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning
A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics
Graph Intelligence Enhanced Bi-Channel Insider Threat Detection
Network Security
Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection
A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches
Reducing Intrusion Alert Trees to Aid Visualization
Attacker Attribution Through Characteristics Inference Using Honeypot Data
Detecting Contradictions from CoAP RFC Based on Knowledge Graph
Mobile Security
A First Look at Android Apps' Third-party Resources Loading
Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset
DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices
A Beyond-5G Authentication and Key Agreement Protocol
IoT Security
A Survey on IoT Vulnerability Discovery
Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks
An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks
Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection
Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset
Privacy-Preserving Machine Learning Protocols and Systems
The Force of Compensation, A Multi-stage Incentive Mechanism Model for Federated Learning
A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication
An Efficient Clustering-Based Privacy-Preserving Recommender System
A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks
Privacy-Preserving Networked Systems and Protocols
Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server
Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare
Enabling Secure Deduplication in Encrypted Decentralized Storage
Geometric Range Searchable Encryption with Forward and Backward Security
Blockchain Security
Towards Secure and Trustworthy Flash Loans: A Blockchain-based Trust Management Approach
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts
BSB: Bringing Safe Browsing to Blockchain Platform
Blockchain-Powered Systems
Practical Anonymous Multi-Hop Locks for Lightning Network Compatible Payment Channel Networks
Blockchain Based Regulatory Technology Deployment for Real Estate Transaction
CVallet: a Blockchain-Oriented Application Development for Education and Recruitment
Decentralized Access Control for Secure Microservices Cooperation with Blockchain
Blockchain-Based Access Control for Smart Manufacturer Secure Management System
Attacks
Driver Locations Harvesting Attack on pRide
Rebound Attacks on SKINNY Hashing with Automatic Tools
Combination Reduction Algorithms and its Application to Subversion Attack
Cryptographic Algorithms and Protocols
Evaluating the Security of Merkle-Damg˚ard Hash Functions and Combiners in Quantum Settings
An Efficient Lattice-Based Encrypted Search Scheme with Forward Security
Strengthening the Security of AES Against Differential Fault Attack.

Browse Subjects

Show more subjects...

Statistics

from
to
Export