Linked e-resources

Details

[I]. Invited papers: 1. Securing Internet of Things / Guang Gong
2. Privacy and ethical challenges in big data / Sébastien Gambs.

[II]. Mobile security: 3. Decentralized dynamic security enforcement for mobile applications with CliSeAuDroid / Tobias Hamann and Heiko Mantel
4. Mobile travel credentials / David Bissessar, Maryam Hezaveh, Fayzah Alshammari, and Carlisle Adams.

[III]. Cloud security and big data: 5. Cloud security auditing : major approaches and existing challenges / Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, and Mourad Debbabi
6. Secure joins with MapReduce / Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, and Lihua Ye
7. Daedalus : network anomaly detection on IDS stream logs / Aniss Chohra, Mourad Debbabi, and Paria Shirani.

[IV]. IoT security: 8. Configuring data flows in the Internet of Things for security and privacy requirements / Luigi Logrippo and Abdelouadoud Stambouli
9. Validating requirements of access control for cloud-edge IoT solutions / Tahir Ahmad and Silvio Ranise.

[V]. Software security, malware analysis, and vulnerability detection: 10. Evading deep neural network and random forest classifiers by generating adversarial samples / Erick Eduardo Bernal Martinez, Bella Oh, Feng Li, and Xiao Luo
11. Protection of systems against fuzzing attacks / Léopold Ouairy, Hélène Le-Bouder, and Jean-Louis Lanet
12. A comparative study across static and dynamic side-channel countermeasures / Yuri Gil Dantas, Tobias Hamann, and Heiko Mantel.

[VI]. Cryptography: 13. Card-based cryptographic protocols with the minimum number of cards using private operations / Hibiki Ono and Yoshifumi Manabe
14. Cryptographic formula obfuscation / Giovanni Di Crescenzo
15. Fault analysis of the new Ukrainian hash function standard : Kupyna / Onur Duman and Amr Youssef.

[VII]. Cyber physical security and hardware security: 16. When fault injection collides with hardware complexity / Sebanjila Kevin Bukasa, Ludovic Claudepierre, Ronan Lashermes, and Jean-Louis Lanet
17. A study on mitigation techniques for SCADA-driven cyber-physical systems / Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, and Joaquin Garcia-Alfaro.

[VIII]. Access control: 18. Mining relationship-based access control policies from incomplete and noisy data / Thang Bui, Scott D. Stoller, and Jiajie Li
19. Fine-grained access control for microservices / Antonio Nehme, Vitor Jesus, Khaled Mahbub, and Ali Abdallah
20. Achieving mobile-health privacy using attribute-based access control / Vignesh Pagadala and Indrakshi Ray.

Browse Subjects

Show more subjects...

Statistics

from
to
Export