Linked e-resources
Details
Table of Contents
Access Control
A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT
Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values
Reliability and Security for Safety-Critical Service Compositions
AI/ML in Security
A Defence Against Trojan Attacks on Deep Neural Networks
An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning
Machine Learning based Android Vulnerability Detection: A Roadmap
Privacy and Web Security
Revelio: A Lightweight Captcha Solver using a Dictionary based Approach
Privacy-Preserving Friend Recommendation in an Integrated Social Environment
A Toolkit for Security Awareness Training against Targeted Phishing
Forensic Source Identification of OSN Compressed Images
Cryptography
Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency
LiARX: A Lightweight Cipher based on the LTS Design Strategy of ARX
Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings
Systems Security
Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information
Attacks on Android-based Smartphones and Impact of Vendor Customization on Android OS Security
Detection of Malign and Benign PE Files Using Texture Analysis
Estimating the Cost of Cybersecurity Activities with CAsPeA.
A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT
Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values
Reliability and Security for Safety-Critical Service Compositions
AI/ML in Security
A Defence Against Trojan Attacks on Deep Neural Networks
An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning
Machine Learning based Android Vulnerability Detection: A Roadmap
Privacy and Web Security
Revelio: A Lightweight Captcha Solver using a Dictionary based Approach
Privacy-Preserving Friend Recommendation in an Integrated Social Environment
A Toolkit for Security Awareness Training against Targeted Phishing
Forensic Source Identification of OSN Compressed Images
Cryptography
Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency
LiARX: A Lightweight Cipher based on the LTS Design Strategy of ARX
Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings
Systems Security
Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information
Attacks on Android-based Smartphones and Impact of Vendor Customization on Android OS Security
Detection of Malign and Benign PE Files Using Texture Analysis
Estimating the Cost of Cybersecurity Activities with CAsPeA.