Stop the war!
Остановите войну!
for scientists:
default search action
Cybersecurity, Volume 3
Volume 3, Number 1, December 2020
- Sudhakar, Sushil Kumar:
An emerging threat Fileless malware: a survey and research challenges. 1 - Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard:
Malware Guard Extension: abusing Intel SGX to conceal cache attacks. 2 - Yiwen Gao, Yongbin Zhou, Wei Cheng:
Efficient electro-magnetic analysis of a GPU bitsliced AES implementation. 3 - Fangli Ren, Zhengwei Jiang, Xuren Wang, Jian Liu:
A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network. 4 - Samar Muslah Albladi, George R. S. Weir:
Predicting individuals' vulnerability to social engineering in social networks. 7 - Florian Skopik, Timea Pahi:
Under false flag: using technical artifacts for cyber attack attribution. 8 - Hui Xu, Yangfan Zhou, Jiang Ming, Michael R. Lyu:
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security. 9 - Rachid Ait Maalem Lahcen, Bruce D. Caulkins, Ram N. Mohapatra, Manish Kumar:
Review and insight on the behavioral aspects of cybersecurity. 10 - Guanyu Li, Dong Du, Yubin Xia:
Iso-UniK: lightweight multi-process unikernel through memory protection keys. 11 - Shuzhou Sun, Hui Ma, Rui Zhang, Wenhan Xu:
Server-aided immediate and robust user revocation mechanism for SM9. 12 - Petar Radanliev, David De Roure, Kevin R. Page, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos, La Treall Maddox, Pete Burnap:
Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains. 13 - Ayei E. Ibor, Florence A. Oladeji, Olusoji B. Okunoye, Obeten O. Ekabua:
Conceptualisation of Cyberattack prediction with deep learning. 14 - Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou:
Using deep learning to solve computer security challenges: a survey. 15 - Serafeim P. Moustakidis, Patrik Karlsson:
A novel feature extraction methodology using Siamese convolutional neural networks for intrusion detection. 16 - Ximeng Liu, Robert H. Deng, Pengfei Wu, Yang Yang:
Lightning-fast and privacy-preserving outsourced computation in the cloud. 17 - Margus Välja, Fredrik Heiding, Ulrik Franke, Robert Lagerström:
Automating threat modeling using an ontology framework. 19 - Mohith Gowda HR, Adithya MV, Gunesh Prasad S, Vinay S:
Development of anti-phishing browser based on random forest and rule of extraction framework. 20 - Yuanzhao Song, Haowen Tan:
Practical pairing-Free sensor cooperation scheme for cloud-Assisted wireless body area networks. 21 - Shisen Fang, Shaojun Yang, Yuexin Zhang:
Inner product encryption from ring learning with errors. 1-11 - Lili Xu, Mingjie Xu, Feng Li, Wei Huo:
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis. 1-19 - Yixiang Wang, ShaoHua Lv, Jiqiang Liu, Xiaolin Chang, Jinqiang Wang:
On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection. 23 - Tiago Espinha Gasiba, Ulrike Lechner, Maria Pinto-Albuquerque:
Sifu - a cybersecurity awareness platform with challenge assessment and intelligent coach. 24
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.