


default search action
Security and Communication Networks, Volume 2018
Volume 2018, 2018
- Shin-Yan Chiou

, Ching-Hsuan Lin:
An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment. 9146297:1-9146297:15 - Pengcheng Cao, Weiwei Liu

, Guangjie Liu
, Xiaopeng Ji
, Jiangtao Zhai
, Yuewei Dai:
A Wireless Covert Channel Based on Constellation Shaping Modulation. 1214681:1-1214681:15 - Jinpei Yan

, Yong Qi
, Qifan Rao:
LSTM-Based Hierarchical Denoising Network for Android Malware Detection. 5249190:1-5249190:18 - Yadong Zhou

, Kaiyue Chen, Junjie Zhang, Junyuan Leng, Yazhe Tang:
Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense. 4760632:1-4760632:15 - Tao Wang

, Hongchang Chen, Guozhen Cheng, Yulin Lu:
SDNManager: A Safeguard Architecture for SDN DoS Attacks Based on Bandwidth Prediction. 7545079:1-7545079:16 - Che Zhang

, Hong Xu
, Libin Liu
, Zhixiong Niu, Peng Wang:
Kuijia: Traffic Rescaling in Software-Defined Data Center WANs. 6361901:1-6361901:12 - Min Zhao

, Yan Xing, Xiao-Wei Li, Qiong-Hua Wang
:
Two-Step Integral Imaging Coding Based Three-Dimensional Information Encryption Approach. 2658318:1-2658318:9 - Ahmed Almusawi

, Haleh Amintoosi
:
DNS Tunneling Detection Method Based on Multilabel Support Vector Machine. 6137098:1-6137098:9 - Xiaoguang Niu

, Jiawei Wang
, Qiongzan Ye
, Yihao Zhang
:
A Privacy-Preserving Incentive Mechanism for Participatory Sensing Systems. 2593537:1-2593537:15 - Wenwen Fu

, Tao Li
, Zhigang Sun:
FAS: Using FPGA to Accelerate and Secure SDN Software Switches. 5650205:1-5650205:13 - Owen Lo

, William J. Buchanan
, Paul Griffiths, Richard Macfarlane:
Distance Measurement Methods for Improved Insider Threat Detection. 5906368:1-5906368:18 - Yongjae Lee, Seunghyeon Lee, Hyunmin Seo, Changhoon Yoon, Seungwon Shin

, Hyunsoo Yoon:
Duo: Software Defined Intrusion Tolerant System Using Dual Cluster. 6751042:1-6751042:13 - Huan Wang

, Hongxia Wang
:
Perceptual Hashing-Based Image Copy-Move Forgery Detection. 6853696:1-6853696:11 - Yu Sun

, Rongrong Ni
, Yao Zhao:
Nonoverlapping Blocks Based Copy-Move Forgery Detection. 1301290:1-1301290:11 - Chao Qi

, Jiangxing Wu, Guozhen Cheng, Jianjian Ai, Shuo Zhao:
Security Analysis of Dynamic SDN Architectures Based on Game Theory. 4123736:1-4123736:10 - Jiawei Tang, Anfeng Liu

, Ming Zhao
, Tian Wang:
An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks. 6328504:1-6328504:30 - Biao Han

, Xiangrui Yang
, Zhigang Sun, Jinfeng Huang, Jinshu Su
:
OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN. 9649643:1-9649643:15 - Jinsoo Park

, Gangsan Kim, Hong-Yeop Song
, Chanki Kim
, Jong-Seon No, Suil Kim:
Analysis of Iterative Erasure Insertion and Decoding of FH/MFSK Systems without Channel State Information. 7318043:1-7318043:12 - Zhixiong Zheng

, Haibo Cheng
, Zijian Zhang
, Yiming Zhao
, Ping Wang
:
An Alternative Method for Understanding User-Chosen Passwords. 6160125:1-6160125:12 - Fang Liu

, Tong Li:
A Clustering k-Anonymity Privacy-Preserving Method for Wearable IoT Devices. 4945152:1-4945152:8 - Shang-Chiuan Su, Yi-Ren Chen, Shi-Chun Tsai

, Yi-Bing Lin:
Detecting P2P Botnet in Software Defined Networks. 4723862:1-4723862:13 - Jian Shen

, Jun Shen, Chin-Feng Lai
, Qi Liu, Tianqi Zhou:
Cloud Based Data Protection in Anonymously Controlled SDN. 9845426:1-9845426:8 - Ihsan H. Abdulqadder

, Deqing Zou, Israa T. Aziz
, Bin Yuan:
Validating User Flows to Protect Software Defined Network Environments. 1308678:1-1308678:14 - Xianyi Chen

, Haidong Zhong, Lizhi Xiong, Zhihua Xia
:
Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion. 1326235:1-1326235:9 - Dawen Xu

, Kai Chen, Rangding Wang, Shubing Su:
Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification. 1734961:1-1734961:14 - ByungRae Cha

, Sun Park
, JongWon Kim, Sung Bum Pan
, Juhyun Shin
:
International Network Performance and Security Testing Based on Distributed Abyss Storage Cluster and Draft of Data Lake Framework. 1746809:1-1746809:14 - Tianliang Lu

, Lu Zhang
, Yixian Fu
:
A Novel Immune-Inspired Shellcode Detection Algorithm Based on Hyperellipsoid Detectors. 2063089:1-2063089:10 - Haibo Yi

:
Under Quantum Computer Attack: Is Rainbow a Replacement of RSA and Elliptic Curves on Hardware? 2369507:1-2369507:9 - Dongmei Niu

, Hongxia Wang
, Minquan Cheng, Canghong Shi:
Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction. 2516324:1-2516324:12 - Chong Fu

, Gao-yuan Zhang, Mai Zhu
, Zhe Chen, Weimin Lei:
A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy. 2708532:1-2708532:13 - Hongchen Wu

, Huaxiang Zhang, Lizhen Cui, Xinjun Wang:
A Heuristic Model for Supporting Users' Decision-Making in Privacy Disclosure for Recommendation. 2790373:1-2790373:13 - Pengdeng Li, Xiaofan Yang

, Qingyu Xiong
, Junhao Wen, Yuan Yan Tang
:
Defending against the Advanced Persistent Threat: An Optimal Control Approach. 2975376:1-2975376:14 - Shuang Zhao, Xiapu Luo, Xiaobo Ma

, Bo Bai, Yankang Zhao, Wei Zou, Zeming Yang, Man Ho Au, Xinliang Qiu:
Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing. 3182402:1-3182402:22 - Ady Wahyudi Paundu

, Doudou Fall, Daisuke Miyamoto, Youki Kadobayashi:
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment. 4216240:1-4216240:18 - Dongdong Zhao, Shu Fang, Jianwen Xiang

, Jing Tian, Shengwu Xiong
:
Iris Template Protection Based on Local Ranking. 4519548:1-4519548:9 - Zhihui Chu

, Huaifeng Chen
, Xiaoyun Wang
, Xiaoyang Dong
, Lu Li
:
Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques. 5160237:1-5160237:11 - Ming Luo

, Yi Luo, Yuwei Wan, Ze Wang:
Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT. 6140978:1-6140978:10 - Xuyun Zhang

, Julian Jang-Jaccard, Lianyong Qi
, Md. Zakirul Alam Bhuiyan
, Chang Liu:
Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications. 6238607:1-6238607:3 - Wilson S. Melo

, Raphael C. S. Machado
, Luiz Fernando Rust da Costa Carmo:
Using Physical Context-Based Authentication against External Attacks: Models and Protocols. 6590928:1-6590928:14 - Jin Cao

, Hui Li, Maode Ma
, Fenghua Li:
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks. 6854612:1-6854612:16 - Miao Yu

, Yongzheng Zhang
, Tianning Zang, Yipeng Wang, Yijing Wang:
Information Propagation Prediction Based on Key Users Authentication in Microblogging. 7024842:1-7024842:7 - Junhui He

, Junxi Chen, Shichang Xiao, Xiaoyu Huang
, Shaohua Tang:
A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition. 7080673:1-7080673:11 - Michele De Donno

, Nicola Dragoni
, Alberto Giaretta
, Angelo Spognardi:
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. 7178164:1-7178164:30 - Kang-Leng Chiew

, Jeffrey Choo Soon Fatt, San-Nah Sze
, Kelvin Sheng Chek Yong:
Leverage Website Favicon to Detect Phishing Websites. 7251750:1-7251750:11 - Binh Van Nguyen

, Hyoyoung Jung
, Kiseon Kim
:
On the Antijamming Performance of the NR-DCSK System. 7963641:1-7963641:8 - Chenglong Cao

, Xiaoling Zhu
:
Practical Secure Transaction for Privacy-Preserving Ride-Hailing Services. 8053967:1-8053967:8 - Tianqi Zhou, Jian Shen

, Xiong Li
, Chen Wang, Jun Shen:
Quantum Cryptography for the Future Internet and the Security Analysis. 8214619:1-8214619:7 - Baraka D. Sija

, Young-Hoon Goo
, Kyu-Seok Shim
, Huru Hasanova
, Myung-Sup Kim
:
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View. 8370341:1-8370341:17 - Hyeonseong Jo

, Jaehyun Nam
, Seungwon Shin
:
NOSArmor: Building a Secure Network Operating System. 9178425:1-9178425:14 - Ping Zhang

, Honggang Hu, Qian Yuan:
Close to Optimally Secure Variants of GCM. 9715947:1-9715947:12 - Yu Yao

, Qiang Fu
, Wei Yang, Ying Wang, Chuan Sheng:
An Epidemic Model of Computer Worms with Time Delay and Variable Infection Rate. 9756982:1-9756982:11 - Ming Li

, Haiju Fan
, Hua Ren
, Dandan Lu
, Di Xiao
, Yang Li
:
Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain. 9803519:1-9803519:12 - Haitao He, Chun Shan

, Xiangmin Tian
, Yalei Wei, Guoyan Huang:
Analysis on Influential Functions in the Weighted Software Network. 1525186:1-1525186:10 - Rui Zhang

, Di Xiao
, Yanting Chang
:
A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing. 1591206:1-1591206:15 - Hyun-Gu Lee

, Jung Yeon Hwang
, Dong In Kim
, Shincheol Lee
, Sung-Hoon Lee
, Ji Sun Shin
:
Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors. 2567463:1-2567463:10 - Suk-Hwan Lee

:
Reversible Data Hiding for DNA Sequence Using Multilevel Histogram Shifting. 3530969:1-3530969:13 - So Ryoung Park

, Ilku Nam, Sanguk Noh:
Modeling and Simulation for the Investigation of Radar Responses to Electronic Attacks in Electronic Warfare Environments. 3580536:1-3580536:13 - Tomás Bajtos, Andrej Gajdos

, Lenka Kleinova, Katarína Lucivjanská
, Pavol Sokol
:
Network Intrusion Detection with Threat Agent Profiling. 3614093:1-3614093:17 - Kyle Coffey, Richard Smith, Leandros Maglaras

, Helge Janicke
:
Vulnerability Analysis of Network Scanning on SCADA Systems. 3794603:1-3794603:21 - Zhiyuan Jiang, Chao Feng

, Chaojing Tang:
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression. 4610320:1-4610320:21 - Tanping Zhou

, Ningbo Li, Xiaoyuan Yang
, Liqun Lv, Yitao Ding, Xu An Wang
:
Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme. 4635715:1-4635715:12 - Lu Ou

, Hui Yin
, Zheng Qin
, Sheng Xiao
, Guangyi Yang, Yupeng Hu:
An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme. 4724815:1-4724815:11 - Dianyan Xiao

, Yang Yu
:
Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption. 4957045:1-4957045:9 - HyunSeo Kang

, YoonJe Sung, HyoungJun Kwon
, SugJoon Yoon
, SangYeong Choi:
An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development. 5150730:1-5150730:12 - Qian Wang

, Jiadong Ren, Xiaoli Yang, Yongqiang Cheng
, Darryl N. Davis, Changzhen Hu:
Security Feature Measurement for Frequent Dynamic Execution Paths in Software System. 5716878:1-5716878:10 - Hongliang Zhu

, Meiqi Chen, Maohua Sun
, Xin Liao
, Lei Hu:
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing. 5841967:1-5841967:12 - Wencheng Sun, Zhiping Cai

, Yangyang Li, Fang Liu, Shengqun Fang, Guoyan Wang:
Security and Privacy in the Medical Internet of Things: A Review. 5978636:1-5978636:9 - Xiue Gao, Duoping Zhang, Keqiu Li, Bo Chen

:
A Cascading Failure Model for Command and Control Networks with Hierarchy Structure. 6063837:1-6063837:14 - Xia ShuangKui, Jianbin Wu

:
A Modification-Free Steganography Method Based on Image Information Entropy. 6256872:1-6256872:8 - Dan Li, Jiazhe Chen

, An Wang, Xiaoyun Wang
:
Analysis of Software Implemented Low Entropy Masking Schemes. 7206835:1-7206835:8 - Jinpei Yan

, Yong Qi
, Qifan Rao:
Detecting Malware with an Ensemble Method Based on Deep Neural Network. 7247095:1-7247095:16 - Zilong Jiang

, Chenhui Jin:
Multiple Impossible Differentials Cryptanalysis on 7-Round ARIA-192. 7453572:1-7453572:11 - Pham-Duy Thanh

, Hiep-Vu Van
, Insoo Koo
:
Efficient Channel Selection and Routing Algorithm for Multihop, Multichannel Cognitive Radio Networks with Energy Harvesting under Jamming Attacks. 7543212:1-7543212:12 - Shuhui Zhang

, Xiangxu Meng
, Lianhai Wang, Lijuan Xu, Xiaohui Han:
Secure Virtualization Environment Based on Advanced Memory Introspection. 9410278:1-9410278:16 - Emanuel Ferreira Jesus

, Vanessa R. L. Chicarino, Célio Vinicius N. de Albuquerque
, Antônio A. de A. Rocha:
A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack. 9675050:1-9675050:27 - Qi Zhang

, An Wang
, Yongchuan Niu
, Ning Shang
, Rixin Xu
, Guoshuang Zhang
, Liehuang Zhu
:
Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9. 9701756:1-9701756:14 - Yanan Chen

, Zhenyu Lu, Hu Xiong
, Weixiang Xu:
Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario. 1378583:1-1378583:14 - Jorge Granjal

, Artur Pedroso
:
An Intrusion Detection and Prevention Framework for Internet-Integrated CoAP WSN. 1753897:1-1753897:14 - Barnali Gupta Banik

, Samir Kumar Bandyopadhyay
:
Blind Key Based Attack Resistant Audio Steganography Using Cocktail Party Effect. 1781384:1-1781384:21 - Yun Chen

, Kun Lv
, Changzhen Hu
:
A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments. 2058429:1-2058429:12 - Chunming Zhang

:
Global Behavior of a Computer Virus Propagation Model on Multilayer Networks. 2153195:1-2153195:9 - Heng Zhang, Zhiping Cai

, Qiang Liu
, Qingjun Xiao, Yangyang Li, Chak-Fong Cheang:
A Survey on Security-Aware Measurement in SDN. 2459154:1-2459154:14 - Hyunwoo Choi

, Yongdae Kim
:
Large-Scale Analysis of Remote Code Injection Attacks in Android Apps. 2489214:1-2489214:17 - Kevser Ovaz Akpinar

, Ibrahim Özçelik
:
Development of the ECAT Preprocessor with the Trust Communication Approach. 2639750:1-2639750:16 - Gaofeng He, Bingfeng Xu

, Haiting Zhu:
AppFA: A Novel Approach to Detect Malicious Android Applications on the Network. 2854728:1-2854728:15 - Chun Shan

, Benfu Jiang, Jingfeng Xue
, Fang Guan, Na Xiao:
An Approach for Internal Network Security Metric Based on Attack Probability. 3652170:1-3652170:11 - Bryan Monk, Julianna Mitchell

, Richard Frank, Garth Davies:
Uncovering Tor: An Examination of the Network Structure. 4231326:1-4231326:12 - Junxin Chen

, Leo Yu Zhang
, Yushu Zhang, Fabio Pareschi
, Yu-Dong Yao:
Exploiting the Security Aspects of Compressive Sampling. 4740174:1 - Milad Taleby Ahvanooey

, Qianmu Li
, Hiuk Jae Shim, Yanyan Huang:
A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents. 5325040:1-5325040:22 - Shahid Mahmood

, Shabieh Farwa
, Muhammad Rafiq, Syed Muhammad Jawwad Riaz, Tariq Shah, Sajjad Shaukat Jamal:
To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers. 5823230:1-5823230:8 - Fucai Luo

, Fuqun Wang, Kunpeng Wang, Jie Li, Kefei Chen:
LWR-Based Fully Homomorphic Encryption, Revisited. 5967635:1-5967635:12 - Jean Caminha

, Angelo Perkusich
, Mirko Perkusich
:
A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things. 6063456:1-6063456:10 - Yao Wang

, Wan-Dong Cai, Pin Lyu, Wei Shao
:
A Combined Static and Dynamic Analysis Approach to Detect Malicious Browser Extensions. 7087239:1-7087239:16 - Qianqian Yang

, Lei Hu
, Danping Shi, Yosuke Todo
, Siwei Sun:
On the Complexity of Impossible Differential Cryptanalysis. 7393401:1-7393401:11 - Krzysztof Szczypiorski

, Liqiang Wang, Xiangyang Luo
, Dengpan Ye:
Big Data Analytics for Information Security. 7657891:1-7657891:2 - Tongxiang Wang

, Xianglin Wei
, Jianhua Fan
, Tao Liang:
Jammer Localization in Multihop Wireless Networks Based on Gravitational Search. 7670939:1-7670939:11 - Yongbin Zeng

, Hui Guang, Guangsong Li
:
Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks. 8470949:1-8470949:9 - Reihaneh Safavi-Naini

, Alireza Poostindouz, Viliam Lisý:
Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication. 8475818:1-8475818:15 - Chenyu Wang

, Guoai Xu
, Wenting Li:
A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment. 9062675:1-9062675:15 - Yuntao Zhao

, Wenbo Zhang
, Yongxin Feng
, Bo Yu:
A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack. 9463653:1-9463653:8 - Hongyu Wang

, Jin Xu, Mingyuan Ma, Hongyan Zhang:
A New Type of Graphical Passwords Based on Odd-Elegant Labelled Graphs. 9482345:1-9482345:11 - Luca Caviglione

, Wojciech Mazurczyk
, Steffen Wendzel
, Sebastian Zander:
Emerging and Unconventional: New Attacks and Innovative Detection Techniques. 9672523:1 - Jin Ye, Xiangyang Cheng

, Jian Zhu, Luting Feng, Ling Song
:
A DDoS Attack Detection Method Based on SVM in Software Defined Network. 9804061:1-9804061:8 - Mohamed Idhammad

, Karim Afdel, Mustapha Belouch
:
Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest. 1263123:1-1263123:13 - Wonsuk Choi, Youngkyung Lee, Duhyeong Lee, Hyoseung Kim, Jin Hyung Park, In Seok Kim, Dong Hoon Lee

:
Less Communication: Energy-Efficient Key Exchange for Securing Implantable Medical Devices. 1809302:1-1809302:16 - Ali El Ksimi

, Leghris Cherkaoui
:
Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks. 1816462:1-1816462:11 - Evgenia Novikova

, Yana A. Bekeneva
, Andrey Shorov
:
The Motif-Based Approach to the Analysis of the Employee Trajectories within Organization. 2476968:1-2476968:12 - Ye Yuan

, Liji Wu
, Yijun Yang
, Xiangmin Zhang:
A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism. 2483619:1-2483619:13 - Yulong Wang

, Junjie Yi
, Jun Guo
, Yanbo Qiao, Mingyue Qi
, Qingyu Chen
:
A Semistructured Random Identifier Protocol for Anonymous Communication in SDN Network. 2916356:1-2916356:20 - Bo Zhang

, Zhongtian Jia, Chuan Zhao:
An Efficient Certificateless Generalized Signcryption Scheme. 3578942:1-3578942:11 - Chen Wang

, Jian Shen
, Qi Liu, Yongjun Ren, Tong Li
:
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things. 3680851:1-3680851:7 - Xin Su

, Ziyu Wang, Xiaofeng Liu, Chang Choi
, Dongmin Choi
:
Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures. 4296934:1-4296934:14 - Manhua Liu

, Shuxin Liu
, Weiwu Yan
:
Latent Fingerprint Segmentation Based on Ridge Density and Orientation Consistency. 4529652:1-4529652:10 - Yi-Hong Du

, Shi-Hua Liu
:
Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks. 4691203:1-4691203:7 - Jun Xu, Xiong Zhang

, Meng Zhou:
A High-Security and Smart Interaction System Based on Hand Gesture Recognition for Internet of Things. 4879496:1-4879496:11 - Qingyi Zhu

, Seng W. Loke, Ye Zhang:
State-Based Switching for Optimal Control of Computer Virus Propagation with External Device Blocking. 4982523:1-4982523:10 - Chunming Zhang

, Jingwei Xiao:
Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model. 5353060:1-5353060:10 - Irene Arsuaga

, Nerea Toledo
, Igor Lopez
, Marina Aguado
:
A Framework for Vulnerability Detection in European Train Control Railway Communications. 5634181:1-5634181:9 - Ding Wang

, Shujun Li, Qi Jiang
:
User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs. 6150491:1-6150491:2 - Zhen-Hao Zhang

, Yurong Song
, Ling-Ling Xia, Yinwei Li
, Liang Zhang
, Guo-Ping Jiang
:
A Novel Load Capacity Model with a Tunable Proportion of Load Redistribution against Cascading Failures. 6254876:1-6254876:7 - Yang Xu

, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, Yaoxue Zhang:
A Feasible Fuzzy-Extended Attribute-Based Access Control Technique. 6476315:1-6476315:11 - Gábor Danner

, Árpád Berta
, István Hegedüs
, Márk Jelasity
:
Robust Fully Distributed Minibatch Gradient Descent with Privacy Preservation. 6728020:1-6728020:15 - Huanran Wang

, Hui He
, Weizhe Zhang
:
Demadroid: Object Reference Graph-Based Malware Detection in Android. 7064131:1-7064131:16 - Faouzi Jaïdi

, Faten Labbene Ayachi, Adel Bouhoula
:
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures. 7142170:1-7142170:22 - Songjie Wei

, Shuai Li
, Peilong Liu
, Meilin Liu
:
BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys. 7202806:1-7202806:14 - Run Xie, Chanlian He, Dongqing Xie, Chongzhi Gao

, Xiaojun Zhang:
A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage. 7254305:1-7254305:7 - Fangfang Shan

, Hui Li, Fenghua Li, Yunchuan Guo
, Ben Niu:
HAC: Hybrid Access Control for Online Social Networks. 7384194:1-7384194:11 - Lihua Yin, Yanwei Sun

, Zhen Wang, Yunchuan Guo
, Fenghua Li, Binxing Fang:
Security Measurement for Unknown Threats Based on Attack Preferences. 7412627:1-7412627:13 - Xiajing Wang

, Rui Ma
, Bowen Dou
, Zefeng Jian
, Hongzhou Chen
:
OFFDTAN: A New Approach of Offline Dynamic Taint Analysis for Binaries. 7693861:1-7693861:13 - Zhiping Cai

, Chengchen Hu, Kai Zheng, Yang Xu
, Qiang Fu
:
Network Security and Management in SDN. 7928503:1-7928503:2 - Guoquan Li, Zheng Yan

, Yulong Fu
, Hanlu Chen:
Data Fusion for Network Intrusion Detection: A Review. 8210614:1-8210614:16 - Zhuo Ma

, Jiuxin Cao
, Xiusheng Chen, Shuai Xu, Bo Liu
, Yuntao Yang:
GLPP: A Game-Based Location Privacy-Preserving Framework in Account Linked Mixed Location-Based Services. 9148768:1-9148768:14 - Yan Zhao

, Shiming Li, Liehui Jiang:
Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment. 9178941:1-9178941:13 - Jong-Hwan Lee, Jeungmin Joo, Kichul Kim, Jung-Hoon Lee

, Young-Ju Park:
Practical Consideration Factors to Design Array Configuration of Direction Finding System for Airborne Signal Intelligence. 9185760:1-9185760:9 - Bruno Carpentieri

:
Efficient Compression and Encryption for Digital Data Transmission. 9591768:1-9591768:9 - Thomas D. Wagner

, Esther Palomar
, Khaled Mahbub, Ali E. Abdallah:
A Novel Trust Taxonomy for Shared Cyber Threat Intelligence. 9634507:1-9634507:11 - Dongyoung Roh

, Sangim Jung
, Daesung Kwon:
Winternitz Signature Scheme Using Nonadjacent Forms. 1452457:1-1452457:12 - Christopher M. Rondeau

, J. Addison Betances, Michael A. Temple
:
Securing ZigBee Commercial Communications Using Constellation Based Distinct Native Attribute Fingerprinting. 1489347:1-1489347:14 - John Patrick Barrowclough, Rameez Asif

:
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. 1681908:1-1681908:20 - Amir Anees

, Iqtadar Hussain
, Abdulmohsen Algarni
, Muhammad Aslam
:
A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map. 1840207:1-1840207:20 - Libing Wu

, Zhiyan Xu
, Debiao He
, Xianmin Wang
:
New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment. 2595273:1-2595273:13 - Maha Shamseddine, Wassim Itani

, Ali Chehab
, Ayman I. Kayssi:
Network Programming and Probabilistic Sketching for Securing the Data Plane. 2905730:1-2905730:23 - Lianmin Shi

, Yihuai Wang
, Zhengqing Wen, Tao Peng:
Secure Data Delivery with Linear Network Coding for Multiple Multicasts with Multiple Streams in Internet of Things. 3729046:1-3729046:13 - Michal Trnka

, Tomás Cerný
, Nathaniel Stickney
:
Survey of Authentication and Authorization for the Internet of Things. 4351603:1-4351603:17 - Erxue Min

, Jun Long
, Qiang Liu
, Jianjing Cui, Wei Chen:
TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest. 4943509:1-4943509:9 - Martin Schramm

, Reiner Dojen, Michael Heigl
:
A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF(sm) Based on Montgomery Arithmetic. 4983404:1-4983404:18 - Jiameng Sun

, Binrui Zhu, Jing Qin
, Jiankun Hu
, Jixin Ma
:
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication. 5275132:1-5275132:15 - Seog Chung Seo, Taek-Young Youn

:
TLDA: An Efficient Two-Layered Data Authentication Mechanism for Content-Centric Networking. 5429798:1-5429798:17 - Ignacio Martín

, José Alberto Hernández
, Alfonso Muñoz, Antonio Guzmán:
Android Malware Characterization Using Metadata and Machine Learning Techniques. 5749481:1-5749481:11 - Youngho Park

, Chul Sur, Kyung-Hyune Rhee
:
A Secure Incentive Scheme for Vehicular Delay Tolerant Networks Using Cryptocurrency. 5932183:1-5932183:13 - Sungyong Cha

, Seungsoo Baek
, Sooyoung Kang, Seungjoo Kim
:
Security Evaluation Framework for Military IoT Devices. 6135845:1-6135845:12 - Jaewoo Shim

, Kyeonghwan Lim
, Seong-je Cho, Sangchul Han, Minkyu Park
:
Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework. 6280768:1-6280768:12 - Gicheol Wang

, Byoung-Sun Lee, Jae Young Ahn, Gihwan Cho:
A UAV-Aided Cluster Head Election Framework and Applying Such to Security-Driven Cluster Head Election Schemes: A Survey. 6475927:1-6475927:17 - Zhenyan Liu

, Yifei Zeng, Pengfei Zhang, Jingfeng Xue
, Ji Zhang, Jiangtao Liu:
An Imbalanced Malicious Domains Detection Method Based on Passive DNS Traffic Analysis. 6510381:1-6510381:7 - Yinghui Zhang

, Pengzhen Lang
, Dong Zheng
, Menglei Yang
, Rui Guo:
A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience. 7202598:1-7202598:13 - Efthimios Alepis, Constantinos Patsakis

:
Session Fingerprinting in Android via Web-to-App Intercommunication. 7352030:1-7352030:13 - Guoxiu Liu, Geng Yang

, Huaqun Wang, Yang Xiang, Hua Dai
:
A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing. 7383514:1-7383514:15 - Chao Qu, Ming Tao

, Jie Zhang, Xiaoyu Hong, Ruifen Yuan:
Blockchain Based Credibility Verification Method for IoT Entities. 7817614:1-7817614:11 - Haihua Liang

, Xinpeng Zhang, Hang Cheng, Qiuhan Wei:
Secure and Efficient Image Retrieval over Encrypted Cloud Data. 7915393:1-7915393:14 - Sahel Alouneh

, Feras Al-Hawari
, Ismail Omar Hababeh
, Gheorghita Ghinea
:
An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks. 8028960:1-8028960:10 - Ying-Ying Liu

, Yun-kai Chu:
Control Method for Sampled-Data Systems with Multiple Channels Based on Deadband-Triggered Scheme. 8165383:1-8165383:10 - Sangwon Hyun

, Junsung Cho
, Geumhwan Cho
, Hyoungshick Kim
:
Design and Analysis of Push Notification-Based Malware on Android. 8510256:1-8510256:12 - Dongwoo Kang

, Jaewook Jung
, Hyoungshick Kim
, Youngsook Lee
, Dongho Won
:
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity. 9046064:1-9046064:14 - Tong Li

, Wenbin Chen
, Yi Tang
, Hongyang Yan:
A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT. 9641273:1-9641273:6 - Blanca E. Carvajal-Gámez

, Manuel Alejandro Díaz-Casco
:
Steganography Algorithm Based on the Nonlocal Maximum Likelihood Noise Estimation for Mobile Applications. 1404826:1-1404826:29 - Xingshuo An, Fuhong Lin

, Shenggang Xu, Li Miao, Chao Gong:
A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing. 1821804:1-1821804:9 - Dinh-Chien Nguyen, Thai-Son Nguyen

, Chin-Chen Chang
, Huan-Sheng Hsueh, Fang-Rong Hsu:
High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift. 2029869:1-2029869:11 - Shuangjie Bai

, Geng Yang
, Jingqi Shi
, Guoxiu Liu, Zhaoe Min:
Privacy-Preserving Oriented Floating-Point Number Fully Homomorphic Encryption Scheme. 2363928:1-2363928:14 - Ruixiang Li

, Yuchen Sun, Jianwei Hu, Te Ma, Xiangyang Luo
:
Street-Level Landmark Evaluation Based on Nearest Routers. 2507293:1-2507293:12 - Cheng Lei

, Hongqi Zhang, Jing-Lei Tan, Yu-Chen Zhang, Xiao-Hu Liu:
Moving Target Defense Techniques: A Survey. 3759626:1-3759626:25 - Tirazheh Zare Garizy, Gilbert Fridgen

, Lars Wederhake
:
A Privacy Preserving Approach to Collaborative Systemic Risk Identification: The Use-Case of Supply Chain Networks. 3858592:1-3858592:18 - Ming Li

, Hua Ren
, En Zhang
, Wei Wang
, Lin Sun
, Di Xiao
:
A VQ-Based Joint Fingerprinting and Decryption Scheme for Secure and Efficient Image Distribution. 4313769:1-4313769:11 - Dafang Zhang

, Guojun Wang, Xin Wang, Zhengyu Li, Wenjia Li:
Cyberspace Security for Future Internet. 5313980:1 - Zhaohui Zhang

, Xinxin Zhou, Xiaobo Zhang, Lizhi Wang, Pengwei Wang
:
A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection. 5680264:1-5680264:9 - Suhri Kim, Kisoon Yoon, Jihoon Kwon

, Seokhie Hong
, Young-Ho Park
:
Efficient Isogeny Computations on Twisted Edwards Curves. 5747642:1-5747642:11 - Hao Hu

, Yuling Liu
, Hongqi Zhang, Yuchen Zhang:
Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis. 5787102:1-5787102:14 - Mohammadreza Mohammadrezaei

, Mohammad Ebrahim Shiri
, Amir Masoud Rahmani
:
Identifying Fake Accounts on Social Networks Based on Graph Analysis and Classification Algorithms. 5923156:1-5923156:8 - Zhizhu Lian

, Yupu Hu, Hu Chen, Baocang Wang
:
Bootstrapping of FHE over the Integers with Large Message Space. 6520258:1-6520258:11 - Won Park

, Youngin You
, Kyungho Lee
:
Detecting Potential Insider Threat: Analyzing Insiders' Sentiment Exposed in Social Media. 7243296:1-7243296:8 - Nawal Ait Aali

, Amine Baïna, Loubna Echabbi:
Trust Management in Collaborative Systems for Critical Infrastructure Protection. 7938727:1-7938727:15 - Jianjun Li, Jie Yu

, Lanlan Xu, Xinying Xue, Chin-Chen Chang
, Xiaoyang Mao, Junfeng Hu:
A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization. 8176984:1-8176984:13 - Salabat Khan

, Zijian Zhang
, Liehuang Zhu
, Meng Li
, Qamas Gul Khan Safi, Xiaobing Chen:
Accountable and Transparent TLS Certificate Management: An Alternate Public-Key Infrastructure with Verifiable Trusted Parties. 8527010:1-8527010:16 - Renan C. A. Alves, Doriedson A. G. Oliveira

, Geovandro C. C. F. Pereira
, Bruno C. Albertini
, Cíntia B. Margi
:
WS3N: Wireless Secure SDN-Based Communication for Sensor Networks. 8734389:1-8734389:14 - Wisam Elmasry

, Akhan Akbulut
, Abdul Halim Zaim
:
Deep Learning Approaches for Predictive Masquerade Detection. 9327215:1-9327215:24 - Xin Jiang, Mingzhe Liu

, Kun Yang, Yanhua Liu, Ruili Wang:
A Security Sandbox Approach of Android Based on Hook Mechanism. 9856537:1-9856537:8 - Gandharba Swain

:
High Capacity Image Steganography Using Modified LSB Substitution and PVD against Pixel Difference Histogram Analysis. 1505896:1-1505896:14 - Yiwen Zhang, Kaibin Wang

, Yuanyuan Zhou
, Qiang He:
Enhanced Adaptive Cloudlet Placement Approach for Mobile Application on Spark. 1937670:1-1937670:12 - Mehmet Simsek:

Corrigendum to "A New Metric for Flow-Level Filtering of Low-Rate DDoS Attacks". 2083430:1-2083430:2 - Hua Dai

, Hui Ren, Zhiye Chen, Geng Yang
, Xun Yi:
Privacy-Preserving Sorting Algorithms Based on Logistic Map for Clouds. 2373545:1-2373545:10 - Ruyan Wang

, Xiaohan Meng, Yang Li
, Jian Wang:
Towards Optimized DFA Attacks on AES under Multibyte Random Fault Model. 2870475:1-2870475:9 - Nanda Kumar Thanigaivelan, Ethiopia Nigussie

, Seppo Virtanen
, Jouni Isoaho
:
Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation. 3672698:1-3672698:15 - Qassim Nasir

, Ilham A. Qasse, Manar AbuTalib, Ali Bou Nassif
:
Performance Analysis of Hyperledger Fabric Platforms. 3976093:1-3976093:14 - Marios Argyriou

, Nicola Dragoni
, Angelo Spognardi
:
Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications. 4672072:1-4672072:15 - Guanghui Liang

, Jianmin Pang
, Zheng Shan, Runqing Yang, Yihang Chen:
Automatic Benchmark Generation Framework for Malware Detection. 4947695:1-4947695:8 - Carlos Andres Lara-Nino

, Arturo Diaz-Perez
, Miguel Morales-Sandoval
:
Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN. 5087065:1-5087065:14 - Ming Wan

, Yan Song
, Yuan Jing
, Junlu Wang
:
Function-Aware Anomaly Detection Based on Wavelet Neural Network for Industrial Control Communication. 5103270:1-5103270:11 - Javier Hingant

, Marcelo Zambrano
, Francisco J. Pérez
, Israel Pérez, Manuel Esteve
:
HYBINT: A Hybrid Intelligence System for Critical Infrastructures Protection. 5625860:1-5625860:13 - Binghao Yan

, Guodong Han
:
LA-GRU: Building Combined Intrusion Detection Model Based on Imbalanced Learning and Gated Recurrent Unit Neural Network. 6026878:1-6026878:13 - Zhenxing Qian

, Kim-Kwang Raymond Choo
, Rémi Cogranne
, Xinpeng Zhang:
Multimedia Security: Novel Steganography and Privacy Preserving. 6390945:1-6390945:2 - Qingsong Zhao, Qingkai Zeng

, Ximeng Liu:
Improved Construction for Inner Product Functional Encryption. 6561418:1-6561418:12 - Guojiang Xin

, Yuling Liu
, Ting Yang, Yu Cao:
An Adaptive Audio Steganography for Covert Wireless Communication. 7096271:1-7096271:10 - Li Li, Siqin Zhou, Kim-Kwang Raymond Choo

, Xiaohong Li
, Debiao He
:
An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System. 7524102:1-7524102:11 - Chunhua Xiao

, Lei Zhang
, Yuhua Xie
, Weichen Liu
, Duo Liu
:
Hardware/Software Adaptive Cryptographic Acceleration for Big Data Processing. 7631342:1-7631342:24 - Yinghui Zhang

, Haonan Su, Menglei Yang
, Dong Zheng
, Fang Ren, Qinglan Zhao:
Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing. 9081814:1-9081814:12 - Chunqiang Yu

, Xianquan Zhang
, Zhenjun Tang
, Yan Chen, Jingyu Huang:
Reversible Data Hiding with Pixel Prediction and Additive Homomorphism for Encrypted Image. 9103418:1-9103418:13 - Nancy Agarwal

, Syed Zeeshan Hussain:
A Closer Look at Intrusion Detection System for Web Applications. 9601357:1-9601357:27 - Jungwoo Seo

, Sangjin Lee:
Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling. 9706706:1-9706706:24 - Ye Yuan

, Junting Xiao, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms. 9846168:1-9846168:14 - Yu Xue

, Weiwei Jia, Xuejian Zhao
, Wei Pang
:
An Evolutionary Computation Based Feature Selection Method for Intrusion Detection. 2492956:1-2492956:10 - Li Kuang

, Yujia Zhu
, Shuqi Li
, Xuejin Yan
, Han Yan
, Shuiguang Deng
:
A Privacy Protection Model of Data Publication Based on Game Theory. 3486529:1-3486529:13 - Gesu Li, Zhipeng Cai

, Guisheng Yin, Zaobo He, Madhuri Siddula:
Differentially Private Recommendation System Based on Community Detection in Social Network Applications. 3530123:1-3530123:18 - Pei Zhang, Wenying Zhang

:
Differential Cryptanalysis on Block Cipher Skinny with MILP Program. 3780407:1-3780407:11 - Xiaoyu Ji

, Yushi Cheng, Wenyuan Xu
, Xinyan Zhou:
User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes. 3980371:1-3980371:10 - Abdul Razaq

, Hanan A. Al-Olayan, Atta Ullah, Arshad Riaz
, Adil Waheed:
A Novel Technique for the Construction of Safe Substitution Boxes Based on Cyclic and Symmetric Groups. 4987021:1-4987021:9 - Karl Andersson

, Ilsun You
, Francesco Palmieri:
Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms. 5346596:1-5346596:2 - Dahee Choi

, Kyungho Lee
:
An Artificial Intelligence Approach to Financial Fraud Detection under IoT Environment: A Survey and Implementation. 5483472:1-5483472:15 - Haitham Elwahsh

, Mona Gamal
, A. A. Salama, Ibrahim M. El-Henawy:
A Novel Approach for Classifying MANETs Attacks with a Neutrosophic Intelligent System based on Genetic Algorithm. 5828517:1-5828517:10 - Lili Bo

, Shujuan Jiang
:
A Constraint-Aware Optimization Method for Concurrency Bug Diagnosis Service in a Distributed Cloud Environment. 6241921:1-6241921:11 - Zheng Yan

, Yuqing Zhang, Kim-Kwang Raymond Choo, Yang Xiang:
Security Measurements of Cyber Networks. 6545314:1-6545314:3 - Taehwan Park

, Hwajeong Seo
, Junsub Kim, Haeryong Park, Howon Kim
:
Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor. 7012056:1-7012056:10 - Hui Xia

, Sanshun Zhang, Benxia Li, Li Li, Xiangguo Cheng:
Towards a Novel Trust-Based Multicast Routing for VANETs. 7608198:1-7608198:12 - Jinbao Wang

, Ling Tian
, Yan Huang
, Donghua Yang
, Hong Gao:
Achieving the Optimal k-Anonymity for Content Privacy in Interactive Cyberphysical Systems. 7963163:1-7963163:15 - Jiwei Tian

, Buhong Wang, Xia Li:
Data-Driven and Low-Sparsity False Data Injection Attacks in Smart Grid. 8045909:1-8045909:11 - Khaled Riad

, Lishan Ke
:
RoughDroid: Operative Scheme for Functional Android Malware Detection. 8087303:1-8087303:10 - Yu Zheng

, Jiezhong Zhu, Wei Fang
, Lian-Hua Chi:
Deep Learning Hash for Wireless Multimedia Image Content Security. 8172725:1-8172725:13 - Yaojun Hao

, Peng Zhang, Fuzhi Zhang
:
Multiview Ensemble Method for Detecting Shilling Attacks in Collaborative Recommender Systems. 8174603:1-8174603:33 - Xiaolong Xu

, Rui Huang, Ruihan Dou, Yuancheng Li, Jie Zhang
, Tao Huang, Wenbin Yu:
Energy-Efficient Cloudlet Management for Privacy Preservation in Wireless Metropolitan Area Networks. 8180451:1-8180451:13 - Youngjoo An

, Hyang-Sook Lee, Juhee Lee, Seongan Lim
:
Key Substitution Attacks on Lattice Signature Schemes Based on SIS Problem. 8525163:1-8525163:13 - Qinlong Huang

, Yue He
, Wei Yue
, Yixian Yang:
Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption. 8932325:1-8932325:12 - Weicheng Wang

, Shengling Wang
, Jianhui Huang:
Privacy Preservation for Friend-Recommendation Applications. 1265352:1-1265352:11 - Samira Haguouche

, Zahi Jarir
:
Towards a Secure and Borderless Collaboration between Organizations: An Automated Enforcement Mechanism. 1572812:1-1572812:13 - Bing Zhang

, Zhiyang Liu
, Yanguo Jia
, Jiadong Ren, Xiaolin Zhao:
Network Intrusion Detection Method Based on PCA and Bayes Algorithm. 1914980:1-1914980:11 - Cheolhee Park

, Hyunil Kim
, Dowon Hong
, Changho Seo
:
A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments. 2193897:1-2193897:16 - Shaozhang Niu

, Ruqiang Huang
, Wenbo Chen, Yiming Xue:
An Improved Permission Management Scheme of Android Application Based on Machine Learning. 2329891:1-2329891:12 - Yunru Zhang, Min Luo

, Kim-Kwang Raymond Choo
, Debiao He
:
A General Architecture for Multiserver Authentication Key Agreement with Provable Security. 2462901:1-2462901:9 - Jingtao Li

, Yang Liu
, Wengang Pei, Zhen Cao:
Security and Communication Networks Behaviors of High-Frequency Subscribers in Cellular Data Networks. 2506319:1-2506319:12 - Yi Zhang

, Jin Sun, Zebin Wu
, Shuangyu Xie, Ruitao Xu:
Scheduling Parallel Intrusion Detecting Applications on Hybrid Clouds. 2863793:1-2863793:12 - Weizhong Qiang

, Shizhen Wang, Hai Jin
:
Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS. 3130652:1-3130652:11 - Baoyuan Kang

, Lin Si, Hong Jiang
, Chunqing Li, Mingming Xie:
ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification. 3205898:1-3205898:9 - Rutvij H. Jhaveri

, Aneri Desai, Ankit Patel
, Yubin Zhong
:
A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs. 3210207:1-3210207:13 - Weiwei Lin

, Hongwei Zeng, Honghao Gao
, Huaikou Miao
, Xiaolin Wang
:
Test Sequence Reduction of Wireless Protocol Conformance Testing to Internet of Things. 3723691:1-3723691:13 - Qilong Han, Zuobin Xiong

, Kejia Zhang
:
Research on Trajectory Data Releasing Method via Differential Privacy Based on Spatial Partition. 4248092:1-4248092:14 - Octavio Flores Siordia

, Juan Carlos Estrada Gutiérrez
, Carlos Eduardo Padilla Leyferman, Jorge Aguilar Santiago
, Maricela Jiménez Rodríguez
:
System to Safeguard the Identity of Persons in Photographs through Cryptography and Steganography Techniques Using Chaos. 4853134:1-4853134:16 - Riccardo Pecori

, Luca Veltri
:
A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord. 4963932:1-4963932:16 - Liming Fang, Liang Liu

, Jinyue Xia, Maosheng Sun:
A Secure Multimedia Data Sharing Scheme for Wireless Network. 5037892:1-5037892:10 - Jieren Cheng

, Chen Zhang
, Xiangyan Tang, Victor S. Sheng
, Zhe Dong, Junqi Li:
Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning. 5198685:1-5198685:19 - Zhen Zhang, Yibing Li, Chao Wang, Meiyu Wang, Ya Tu, Jin Wang

:
An Ensemble Learning Method for Wireless Multimedia Device Identification. 5264526:1-5264526:9 - Xin Wang, Bo Yang

, Zhe Xia, Yanqi Zhao, Huifang Yu
:
A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing. 6174830:1-6174830:13 - Muhammad Bilal

, Muhammad Asif
, Abid Bashir
:
Assessment of Secure OpenID-Based DAAA Protocol for Avoiding Session Hijacking in Web Applications. 6315039:1-6315039:10 - Chunpeng Ge

, Jinyue Xia, Aaron Wu, Hongwei Li, Yao Wang:
A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network. 6395362:1-6395362:8 - Ugur Coruh

, Oguz Bayat:
Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks. 6563089:1-6563089:25 - Imen Nouioua

, Nouredine Amardjia, Sarra Belilita:
A Novel Blind and Robust Video Watermarking Technique in Fast Motion Frames Based on SVD and MR-SVD. 6712065:1-6712065:17 - Jinquan Zhang, Yanfeng Yuan, Xiao Wang, Lina Ni

, Jiguo Yu
, Mengmeng Zhang:
RPAR: Location Privacy Preserving via Repartitioning Anonymous Region in Mobile Social Network. 6829326:1-6829326:10 - Youwen Zhu, Yue Zhang, Jiabin Yuan, Xianmin Wang

:
FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things. 6909703:1-6909703:9 - Zhaozheng Li

, Weimin Lei
, Wei Zhang, KwangHyok Jo:
A Relative Phase Based Audio Integrity Protection Method: Model and Strategy. 7139391:1-7139391:11 - Haosu Cheng

, Jianwei Liu
, Jian Mao
, Mengmeng Wang, Jie Chen, Jingdong Bian:
A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN. 8392080:1-8392080:20 - Guodong Ye

, Kaixin Jiao, Chen Pan, Xiaoling Huang
:
An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map. 8402578:1-8402578:11 - Jiguo Li

, Shengzhou Hu, Yichen Zhang:
Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key. 8738960:1-8738960:10 - Xiaolong Liu

, Qiang Wei
, Qingxian Wang, Zheng Zhao
, Zhongxu Yin:
CAFA: A Checksum-Aware Fuzzing Assistant Tool for Coverage Improvement. 9071065:1-9071065:13 - Ke Yin

:
A Study on Effectiveness Evaluation for the Physical Protection System of a High Security Prison Based on the Cloud Model. 9583982:1-9583982:9 - Rahul Saha

, G. Geetha, Gulshan Kumar
, Tai-Hoon Kim:
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys. 9802475:1-9802475:11 - Zied Kricha

, Anis Kricha, Anis Sakly:
A Robust Watermarking Scheme Based on the Mean Modulation of DWT Coefficients. 1254081:1-1254081:16 - Zhenghong Wang

, Zhangjie Fu
, Xingming Sun
:
Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud. 1420930:1-1420930:10 - Sitalakshmi Venkatraman

, Mamoun Alazab
:
Use of Data Visualisation for Zero-Day Malware Detection. 1728303:1-1728303:13 - Kholoud Al-Saleh, Abdelfettah Belghith

:
Practical Suitability and Experimental Assessment of Tree ORAMs. 2138147:1-2138147:15 - Xiling Luo, Zequan Zhou, Lin Zhong, Jian Mao

, Chaoyong Chen:
An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature. 2615249:1-2615249:11 - Kiseon Kim

, Jalel Ben-Othman
, Prem Mahalik:
Covert Communication Networks in Hostile Environments. 2731859:1-2731859:2 - Thanh Hong Nguyen

, Mason Wright, Michael P. Wellman
, Satinder Singh:
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis. 2864873:1-2864873:28 - Naveed Ahmed Azam

, Umar Hayat
, Ikram Ullah
:
An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization. 3421725:1-3421725:9 - Mirsat Yesiltepe

, Muhammet Kurulay
:
Fake and Real Massaging at the Same Time with QR Code in Web Services for Different Users. 3809462:1-3809462:10 - Iqtadar Hussain

, Fawad Ahmed, Umar Mujahid Khokhar, Amir Anees
:
Applied Cryptography and Noise Resistant Data Security. 3962821:1-3962821:2 - Longdan Tan, Kesheng Liu, Xuehu Yan

, Lintao Liu, Tianqi Lu, Jinrui Chen, Feng Liu
, Yuliang Lu:
Robust Visual Secret Sharing Scheme Applying to QR Code. 4036815:1-4036815:12 - Weiwei Liu

, Guangjie Liu
, Yang Xia, Xiaopeng Ji, Jiangtao Zhai
, Yuewei Dai:
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking. 5051270:1-5051270:16 - Hong Wang

, Jianhua Li, Feng Zhu, Zhe Wang:
Asynchronous Group Authentication Based on Geometric Approach. 5289383:1-5289383:9 - Jian Song

, Guangsong Li
, Bo-ru Xu, Chuangui Ma:
A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service. 5432960:1-5432960:13 - Zhendong Wu

, Jiajia Yang, Jianwu Zhang, Hengli Yue:
Multibiometric Fusion Authentication in Wireless Multimedia Environment Using Dynamic Bayesian Method. 5783976:1-5783976:12 - Tan N. Nguyen

, Minh Tran
, Phuong T. Tran
, Phu Tran Tin
, Thanh-Long Nguyen
, Duy-Hung Ha
, Miroslav Voznák
:
On the Performance of Power Splitting Energy Harvested Wireless Full-Duplex Relaying Network with Imperfect CSI over Dissimilar Channels. 6036087:1-6036087:11 - Minhye Seo

, Jong Hwan Park
, Youngsam Kim
, Sangrae Cho, Dong Hoon Lee
, Jung Yeon Hwang
:
Construction of a New Biometric-Based Key Derivation Function and Its Application. 6107912:1-6107912:14 - Xiaodan Gu, Ming Yang

, Yiting Zhang, Peilong Pan, Zhen Ling
:
Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment. 6124160:1-6124160:15 - Jieren Cheng

, Mengyang Li
, Xiangyan Tang, Victor S. Sheng
, Yifu Liu
, Wei Guo
:
Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing. 6459326:1-6459326:14 - Xinyi Hu

, Yaqun Zhao:
Research on Plaintext Restoration of AES Based on Neural Network. 6868506:1-6868506:9 - Chen Li, Yecai Guo

, Qi Liu, Xiaodong Liu:
DR-Net: A Novel Generative Adversarial Network for Single Image Deraining. 7350324:1-7350324:14 - Inwoo Ro, Joong Soo Han, Eul Gyu Im

:
Detection Method for Distributed Web-Crawlers: A Long-Tail Threshold Model. 9065424:1-9065424:7 - Dan Yin

, Qing Yang
:
GANs Based Density Distribution Privacy-Preservation on Mobility Data. 9203076:1-9203076:13 - Pablo Salva-Garcia

, José M. Alcaraz Calero
, Qi Wang
, Jorge Bernal Bernabé
, Antonio F. Skarmeta
:
5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks. 9291506:1-9291506:21 - Huifang Yu

, Zhicang Wang, Jianmin Li, Xinzhe Gao:
Identity-Based Proxy Signcryption Protocol with Universal Composability. 9531784:1-9531784:11 - Xuefei Liu, Chao Zhang

, Pingzeng Liu, Maoling Yan, Baojia Wang, Jianyong Zhang, Russell Higgs
:
Application of Temperature Prediction Based on Neural Network in Intrusion Detection of IoT. 1635081:1-1635081:10 - Weizhong Qiang

, Shizhen Wang, Hai Jin
, Jiangying Zhong
:
Corrigendum to "Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS". 5618453:1 - Xiufeng Zhao

, Hefeng Mao, Shuai Liu, Weitao Song, Bo Zhang
:
Analysis on Matrix GSW-FHE and Optimizing Bootstrapping. 6362010:1-6362010:9 - Xun Wang

, Tao Luo
, Jianfeng Li:
A More Efficient Fully Homomorphic Encryption Scheme Based on GSW and DM Schemes. 8706940:1-8706940:14 - Rafal Kozik

, Marek Pawlicki
, Michal Choras:
Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection. 8753870:1-8753870:8 - Guilherme Oliveira

, Evelio M. G. Fernández
, Samuel Baraldi Mafra, Samuel Montejo Sánchez
, Cesar A. Azurdia-Meza:
Optimal Improper Gaussian Signaling for Physical Layer Security in Cognitive Radio Networks. 9065856:1-9065856:13 - Xiufeng Zhao

, Ailan Wang:
Generalized Bootstrapping Technique Based on Block Equality Test Algorithm. 9325082:1-9325082:8 - Duc-Minh Ngo

, Cuong Pham-Quoc
, Tran Ngoc Thinh:
An Efficient High-Throughput and Low-Latency SYN Flood Defender for High-Speed Networks. 9562801:1-9562801:14

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














