Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS

Linked e-resources

Details

[I]. Attacks: Detecting adversarial attacks in the context of Bayesian networks / Emad Alsuwat, Hatim Alsuwat, John Rose, Marco Valtorta, and Csilla Farkas
AGBuilder : an AI tool for automated attack graph building, analysis, and refinement / Bruhadeshwar Bezawada, Indrajit Ray, and Kushagra Tiwary
On practical aspects of PCFG password cracking / Radek Hranický, Filip Lištiak, Dávid Mikuš, and Ondřej Ryšavý
That's my DNA : detecting malicious tampering of synthesized DNA / Diptendu Mohan Kar and Indrajit Ray.

[II]. Mobile and web security: Adversarial sampling attacks against phishing detection / Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, and Charles Anderson
Is my phone listening in? On the feasibility and detectability of mobile eavesdropping / Jacob Leon Kröger and Philip Raschke
Droids in disarray : detecting frame confusion in hybrid Android apps / Davide Caputo, Luca Verderame, Simone Aonzo, and Alessio Merlo.

[III]. Privacy: Geo-graph-indistinguishability : protecting location privacy for LBS over road networks / Shun Takagi, Yang Cao, Yasuhito Asano, and Masatoshi Yoshikawa
"When and where do you want to hide?" : recommendation of location privacy preferences with local differential privacy / Maho Asada, Masatoshi Yoshikawa, and Yang Cao
Analysis of privacy policies to enhance informed consent / Raúl Pardo and Daniel Le Métayer .

[IV]. Security protocol practices: Lost in TLS? No more! Assisted deployment of secure TLS configurations / Salvatore Manfredi, Silvio Ranise, and Giada Sciarretta
Contributing to current challenges in identity and access management with visual analytics / Alexander Puchta, Fabian Böhm, and Günther Pernul
Analysis of multi-path Onion routing-based anonymization networks / Wladimir De la Cadena, Daniel Kaiser, Asya Mitseva, Andriy Panchenko, and Thomas Engel.

[V]. Distributed systems: Shoal : query optimization and operator placement for access controlled stream processing systems / Cory Thoma, Alexandros Labrinidis, and Adam J. Lee
A distributed ledger approach to digital twin secure data sharing / Marietheres Dietz, Benedikt Putz, and Günther Pernul
Refresh instead of revoke enhances safety and availability : a formal analysis / Mehrnoosh Shakarami and Ravi Sandhu.

[VI]. Source code security: Wrangling in the power of code pointers with ProxyCFI / Misiker Tadesse Aga, Colton Holoday, and Todd Austin
CASFinder : detecting common attack surface / Mengyuan Zhang, Yue Xin, Lingyu Wang, Sushil Jajodia, and Anoop Singhal
Algorithm diversity for resilient systems / Scott D. Stoller and Yanhong A. Liu.

[VII]. Malware: Online malware detection in cloud auto-scaling systems using shallow convolutional neural networks / Mahmoud Abdelsalam, Ram Krishnan, and Ravi Sandhu
Redirecting malware's target selection with decoy processes / Sara Sutton, Garret Michilli, and Julian Rrushi.

Browse Subjects

Show more subjects...

Statistics

from
to
Export