


default search action
Security and Communication Networks, Volume 2019
Volume 2019, 2019
- Yubiao Wang

, Junhao Wen
, Xibin Wang
, Bamei Tao
, Wei Zhou:
A Cloud Service Trust Evaluation Model Based on Combining Weights and Gray Correlation Analysis. 2437062:1-2437062:11 - Shuang Zhao, Shuhui Chen

, Yipin Sun, Zhiping Cai
, Jinshu Su
:
Identifying Known and Unknown Mobile Application Traffic Using a Multilevel Classifier. 9595081:1-9595081:11 - Xiaoye Li

, Jing Yang
, Zhenlong Sun
, Jianpei Zhang
:
Differentially Private Release of the Distribution of Clustering Coefficients across Communities. 2518714:1-2518714:9 - Yuichi Komano

, Kazuo Ohta, Kazuo Sakiyama, Mitsugu Iwamoto, Ingrid Verbauwhede
:
Single-Round Pattern Matching Key Generation Using Physically Unclonable Function. 1719585:1-1719585:13 - Ángel Martín del Rey

, Lu-Xing Yang
, Vasileios Karyotis
:
Mathematical Models for Malware Propagation. 6046353:1-6046353:2 - Mohamed Ali Hajjaji

, Mohamed Gafsi
, Abdessalem Ben Abdelali
, Abdellatif Mtibaa
:
FPGA Implementation of Digital Images Watermarking System Based on Discrete Haar Wavelet Transform. 1294267:1-1294267:17 - Liran Ma

, Yan Huo
, Chunqiang Hu, Wei Li:
Security and Privacy for Smart Cyber-Physical Systems. 7045862:1-7045862:2 - Ming Xu

, Weili Han
:
An Explainable Password Strength Meter Addon via Textual Pattern Recognition. 5184643:1-5184643:10 - Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue

, Dingding Jia, Yamin Liu:
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy. 1816393:1-1816393:12 - Zhenjun Tang

, Ye Yang, Shijie Xu
, Chunqiang Yu
, Xianquan Zhang
:
Image Encryption with Double Spiral Scans and Chaotic Maps. 8694678:1-8694678:15 - Rashid Abbasi

, Lixiang Xu, Farhan Amin
, Bin Luo:
Efficient Lossless Compression Based Reversible Data Hiding Using Multilayered n-Bit Localization. 8981240:1-8981240:13 - Baodong Qin

:
Tightly Secure Lossy Trapdoor Functions: Constructions and Applications. 3636759:1-3636759:13 - Xu Wang

, Bo Song, Wei Ni
, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng:
Group-Based Susceptible-Infectious-Susceptible Model in Large-Scale Directed Networks. 1657164:1-1657164:9 - Yunxue Yan, Lei Wu

, Wenyu Xu, Hao Wang, Zhaoman Liu:
Integrity Audit of Shared Cloud Data with Identity Tracking. 1354346:1-1354346:11 - JingJing Wang

, Yiliang Han
, Xiaoyuan Yang
, Tanping Zhou
, Jiayong Chen:
A New Group Location Privacy-Preserving Method Based on Distributed Architecture in LBS. 2414687:1-2414687:14 - Yuntao Zhao

, Bo Bo, Yongxin Feng
, ChunYu Xu, Bo Yu:
A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning. 2674684:1-2674684:8 - Laurence T. Yang

, Wei Wang, Gregorio Martínez Pérez
, Willy Susilo
:
Security, Privacy, and Trust for Cyberphysical-Social Systems. 2964673:1-2964673:2 - Mishall Al-Zubaidie

, Zhongwei Zhang, Ji Zhang:
RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications. 3263902:1-3263902:26 - Viet Cuong Trinh

:
A Short Server-Aided Certificateless Aggregate Multisignature Scheme in the Standard Model. 3424890:1-3424890:14 - Wenli Shang

, Tianyu Gong, Chunyu Chen, Jing Hou, Peng Zeng
:
Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees. 3574675:1-3574675:11 - Dilara Acarali

, Muttukrishnan Rajarajan, Nikos Komninos
, Bruno Bogaz Zarpelão
:
Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks. 3745619:1-3745619:13 - Teng Hu

, Weina Niu
, Xiaosong Zhang
, Xiaolei Liu, Jiazhong Lu
, Yuan Liu:
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning. 3898951:1-3898951:12 - Darong Huang

, Lanyan Ke
, Bo Mi, Guosheng Wei, Jian Wang, Shaohua Wan
:
A Cooperative Denoising Algorithm with Interactive Dynamic Adjustment Function for Security of Stacker in Industrial Internet of Things. 4049765:1-4049765:16 - Jian Sun

, Guanhua Huang, Arun Kumar Sangaiah
, Guangyang Zhu, Xiaojiang Du:
Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective. 4074272:1-4074272:15 - Toan-Thinh Truong

, Minh-Triet Tran
, Anh Duc Duong:
Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment. 4250743:1-4250743:11 - Yasuyuki Kawanishi, Hideaki Nishihara, Daisuke Souma, Hirotaka Yoshida

, Yoichi Hata:
A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design. 4614721:1-4614721:35 - Bin Ma

, Bing Li
, Xiao-Yu Wang
, Chunpeng Wang
, Jian Li
, Yun-Qing Shi:
Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image. 4732632:1-4732632:9 - Soultana Ellinidou

, Gaurav Sharma, Théo Rigas, Tristan Vanspouwen, Olivier Markowitch, Jean-Michel Dricot:
SSPSoC: A Secure SDN-Based Protocol over MPSoC. 4869167:1-4869167:11 - Krzysztof Cabaj

, Marcin Gregorczyk, Wojciech Mazurczyk
, Piotr Nowakowski
, Piotr Zórawski
:
Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System. 4930908:1-4930908:22 - Dhanu Dwiardhika

, Takuji Tachibana
:
Virtual Network Embedding Based on Security Level with VNF Placement. 5640134:1-5640134:11 - Jin Wook Byun

:
A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function. 5935292:1-5935292:15 - Han Zhang

, Yuanbo Guo, Tao Li:
Multifeature Named Entity Recognition in Information Security Based on Adversarial Learning. 6417407:1-6417407:9 - Marcin Luckner

:
Practical Web Spam Lifelong Machine Learning System with Automatic Adjustment to Current Lifecycle Phase. 6587020:1-6587020:16 - Maurantonio Caprolu

, Simone Raponi
, Roberto Di Pietro
:
FORTRESS: An Efficient and Distributed Firewall for Stateful Data Plane SDN. 6874592:1-6874592:16 - Guoyan Huang, Qian Wang, Xinqian Liu

, Xiaobing Hao, Huaizhi Yan:
Mining the Key Nodes from Software Network Based on Fault Accumulation and Propagation. 7140480:1-7140480:11 - Hyun-A. Park

:
Secure Information Sharing System for Online Patient Networks. 7541269:1-7541269:16 - Haiying Ma

, Zhanjun Wang
, Zhijin Guan
:
Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation. 8093578:1-8093578:11 - Édgar Salguero Dorokhin

, Walter Fuertes
, Edison Lascano
:
On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key. 8214681:1-8214681:10 - Wenting Shen, Jing Qin

, Jixin Ma
:
A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment. 8275074:1-8275074:15 - Yong-Seok Lee, Young-Ho Seo

, Dong-Wook Kim
:
Blind Image Watermarking Based on Adaptive Data Spreading in n-Level DWT Subbands. 8357251:1-8357251:11 - Jiadong Ren, Zhangqi Zheng

, Qian Liu, Zhiyao Wei, Huaizhi Yan:
A Buffer Overflow Prediction Approach Based on Software Metrics and Machine Learning. 8391425:1-8391425:13 - Meiyu Zhang

, Qianying Zhang
, Shijun Zhao, Zhiping Shi
, Yong Guan:
SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks. 8690853:1-8690853:12 - Fute Shang

, Buhong Wang
, Fuhu Yan, Tengyao Li
:
Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems. 8936784:1-8936784:11 - Gustav Sourek

, Filip Zelezný
:
Efficient Extraction of Network Event Types from NetFlows. 8954914:1-8954914:18 - Mingfu Xue

, Chengxiang Yuan, Zhe Liu, Jian Wang
:
SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations. 9795621:1-9795621:18 - Yu Zhou

, Yongzhuang Wei, Fengrong Zhang:
Measuring the Sum-of-Squares Indicator of Boolean Functions in Encryption Algorithm for Internet of Things. 1348639:1-1348639:15 - Joseph I. Choi

, Kevin R. B. Butler
:
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities. 1368905:1-1368905:28 - Vasyl Ustimenko

, Urszula Romanczuk-Polubiec
, Aneta Wróblewska
, Monika Katarzyna Polak, Eustrat Zhupa:
On the Constructions of New Symmetric Ciphers Based on Nonbijective Multivariate Maps of Prescribed Degree. 2137561:1-2137561:15 - Hefeng Chen

, Chin-Chen Chang
:
A Novel (t, n) Secret Sharing Scheme Based upon Euler's Theorem. 2387358:1-2387358:7 - Haitao Song

, Guangming Tang
, Yifeng Sun
, Zhanzhan Gao
:
Security Measure for Image Steganography Based on High Dimensional KL Divergence. 3546367:1-3546367:13 - SeokHwan Choi

, Jin-Myeong Shin
, Yoon-Ho Choi
:
Dynamic Nonparametric Random Forest Using Covariance. 3984031:1-3984031:12 - Nelson Ochieng

, Waweru Mwangi, Ismail Ateya
:
Optimizing Computer Worm Detection Using Ensembles. 4656480:1-4656480:10 - Yuntao Zhao

, ChunYu Xu, Bo Bo, Yongxin Feng
:
MalDeep: A Deep Learning Classification Framework against Malware Variants Based on Texture Visualization. 4895984:1-4895984:11 - Wenjie Liu

, Peipei Gao, Zhihao Liu, Hanwu Chen, Maojun Zhang
:
A Quantum-Based Database Query Scheme for Privacy Preservation in Cloud Environment. 4923590:1-4923590:14 - Jieren Cheng

, Mengyang Li
, Xiangyan Tang
, Victor S. Sheng
, Yifu Liu
, Wei Guo
:
Corrigendum to "Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing". 6809054:1 - Kevser Ovaz Akpinar

, Ibrahim Özçelik
:
Corrigendum to "Development of the ECAT Preprocessor with the Trust Communication Approach". 7457154:1 - Zhaoqing Pan

, Ching-Nung Yang, Victor S. Sheng
, Naixue Xiong
, Weizhi Meng
:
Machine Learning for Wireless Multimedia Data Security. 7682306:1-7682306:2 - Tran Khanh Dang

, Khanh T. K. Tran
:
The Meeting of Acquaintances: A Cost-Efficient Authentication Scheme for Light-Weight Objects with Transient Trust Level and Plurality Approach. 8123259:1-8123259:18 - Mahmoud Abu-Zant, Adwan Yasin

:
Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV). 8249108:1-8249108:12 - Young-Seob Jeong

, Jiyoung Woo
, Ah Reum Kang
:
Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks. 8485365:1-8485365:9 - Lei He

, Jianfeng Ma
, Ruo Mo
, Dawei Wei:
Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing. 8583130:1-8583130:12 - Junhyoung Oh

, Ukjin Lee, Kyungho Lee
:
Usability Evaluation Model for Biometric System considering Privacy Concern Based on MCDM Model. 8715264:1-8715264:14 - Tianbo Lu

, Ting Meng, Chao Li
, Guozhen Dong, Huiyang Li, Jiao Zhang
, Xiaoyan Zhang:
MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication. 9078176:1-9078176:15 - Federica Lago

, Quoc-Tin Phan, Giulia Boato:
Visual and Textual Analysis for Image Trustworthiness Assessment within Online News. 9236910:1-9236910:14 - Yinqiao Xiong

, Peidong Zhu
, Zhizhu Liu, Hui Yin
, Tiantian Deng:
EPLC: An Efficient Privacy-Preserving Line-Loss Calculation Scheme for Residential Areas of Smart Grid. 9637578:1-9637578:14 - Hoang-Nam Pham-Nguyen

, Quang Tran Minh
:
Dynamic Resource Provisioning on Fog Landscapes. 1798391:1-1798391:15 - Amirreza Niakanlahiji

, Jafar Haadi Jafarian
:
WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense. 2156906:1-2156906:13 - Ping Wang

, Bin Li, Hongjin Shi, Yaosheng Shen, Ding Wang
:
Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments. 2516963:1-2516963:13 - Yujiao Song, Hao Wang

, Xiaochao Wei, Lei Wu
:
Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud. 3249726:1-3249726:9 - Xuyun Zhang

, Yuan Yuan, Zhili Zhou, Shancang Li, Lianyong Qi
, Deepak Puthal:
Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things. 4529757:1-4529757:4 - Baosheng Wang, Yi Wang

, Rongmao Chen
:
A Practical Authentication Framework for VANETs. 4752612:1-4752612:11 - Libing Wu

, Jing Wang, Sherali Zeadally, Debiao He
:
Anonymous and Efficient Message Authentication Scheme for Smart Grid. 4836016:1-4836016:12 - E. Munivel

, Kannammal Annadurai:
New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing. 5141395:1-5141395:11 - Yu Zhang

, Yin Li
, Yifan Wang:
Secure and Efficient Searchable Public Key Encryption for Resource Constrained Environment Based on Pairings under Prime Order Group. 5280806:1-5280806:14 - Leila Khatibzadeh

, Zarrintaj Bornaee
, Abbas Ghaemi Bafghi:
Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic. 5306395:1-5306395:11 - Mohamed Amine Ferrag

, Leandros A. Maglaras
, Abdelouahid Derhab
:
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends. 5452870:1-5452870:20 - Ankang Ju

, Yuanbo Guo, Ziwei Ye
, Tao Li, Jing Ma:
HeteMSD: A Big Data Analytics Framework for Targeted Cyber-Attacks Detection Using Heterogeneous Multisource Data. 5483918:1-5483918:9 - Ye Yuan

, Liji Wu
, Yijun Yang
, Xiangmin Zhang:
Erratum to "A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism". 5742308:1-5742308:2 - Jizhi Wang

:
The Prediction of Serial Number in OpenSSL's X.509 Certificate. 6013846:1-6013846:11 - Hala Abu Dhailah

, Eyad Taqieddin
, Abdallah Y. Alma'aitah
:
An Enhanced and Resource-Aware RFID Multitag Grouping Protocol. 6862052:1-6862052:15 - Jiaji Pan, Yi-Ning Liu

, Weiming Zhang
:
Detection of Dummy Trajectories Using Convolutional Neural Networks. 8431074:1-8431074:12 - Rui Zhu

, Li Xu
, Yali Zeng, Xun Yi:
Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification. 9126376:1-9126376:12 - Neline van Ginkel

, Willem De Groef, Fabio Massacci
, Frank Piessens:
A Server-Side JavaScript Security Architecture for Secure Integration of Third-Party Libraries. 9629034:1-9629034:21 - Peyman Jafary

, Antti Supponen, Mikko Salmenperä, Sami Repo
:
Analyzing Reliability of the Communication for Secure and Highly Available GOOSE-Based Logic Selectivity. 9682189:1-9682189:16 - Hojoong Park

, Yongjin Yeom
, Ju-Sung Kang
:
A Lightweight BCH Code Corrector of TRNG with Measurable Dependence. 9684239:1-9684239:11 - Qian Lu

, Haipeng Qu
, Yuzhan Ouyang
, Jiahui Zhang
:
SLFAT: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames. 2718741:1-2718741:10 - Sanghoon Lee, Ik Rae Jeong

:
A Cancelable Template for the Low-Quality Fingerprints from Wearable Devices. 4202671:1-4202671:8 - Quanbo Qu

, Baocang Wang
, Yuan Ping
, Zhili Zhang
:
Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme. 8319508:1-8319508:6 - Mengxia Shuai

, Bin Liu, Nenghai Yu
, Ling Xiong
:
Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks. 8145087:1-8145087:14 - Yong Xie, Songsong Zhang, Xiang Li, Yanggui Li

, Yuan Chai:
CasCP: Efficient and Secure Certificateless Authentication Scheme for Wireless Body Area Networks with Conditional Privacy-Preserving. 5860286:1-5860286:13 - Yu Zhan

, Baocang Wang
:
Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network. 6059834:1-6059834:5 - Kaifan Huang

, Pengdeng Li, Lu-Xing Yang
, Xiaofan Yang
, Yuan Yan Tang
:
Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach. 2315627:1-2315627:12 - Wei Bai

, Zhisong Pan
, Shize Guo, Zhe Chen:
RMMDI: A Novel Framework for Role Mining Based on the Multi-Domain Information. 8085303:1-8085303:15 - Yu Liu

, Xiaolei Liu
, Yanmin Zhao:
Security Cryptanalysis of NUX for the Internet of Things. 2062697:1-2062697:12 - Jiazhong Lu

, Fengmao Lv
, Zhongliu Zhuo, Xiaosong Zhang
, Xiaolei Liu, Teng Hu
, Wei Deng
:
Integrating Traffics with Network Device Logs for Anomaly Detection. 5695021:1-5695021:10 - Jiadong Ren, Jiawei Guo, Qian Wang, Yuan Huang

, Hao Xiaobing
, Hu Jingjing:
Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms. 7130868:1-7130868:11 - Hisham A. Kholidy

, Abdelkarim Erradi:
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems. 6816943:1-6816943:15 - Wei Sun

, Hao Zhang, Li-jun Cai, Ai-min Yu, Jinqiao Shi, Jian-Guo Jiang:
A Novel Device Identification Method Based on Passive Measurement. 6045251:1-6045251:11 - Thein Than Thwin

, Sangsuree Vasupongayya
:
Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems. 8315614:1-8315614:15 - Feifei Wang

, Guoai Xu
, Chenyu Wang
, Junhao Peng:
A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment. 2838615:1-2838615:15 - Chao Yang

, Junwei Zhang
, Jingjing Guo
, Yu Zheng, Li Yang, Jianfeng Ma
:
Fingerprint Protected Password Authentication Protocol. 1694702:1-1694702:12 - Chenghai Li, Fangzheng Zhao

, Chen Liu, Lei Lei, Jie Zhang
:
A Hyperchaotic Color Image Encryption Algorithm and Security Analysis. 8132547:1-8132547:8 - Dawen Xu

, Shubing Su:
Separable Reversible Data Hiding in Encrypted Images Based on Difference Histogram Modification. 7480147:1-7480147:14 - Binrui Zhu, Jiameng Sun

, Jing Qin
, Jixin Ma
:
A Secure Data Sharing Scheme with Designated Server. 4268731:1-4268731:16 - Harry Bartlett

, Ed Dawson, Hassan Qahur Al Mahri, Md. Iftekhar Salam
, Leonie Simpson
, Kenneth Koon-Ho Wong
:
Random Fault Attacks on a Class of Stream Ciphers. 1680263:1-1680263:12 - Jae Yeol Jeong

, Ik Rae Jeong
:
Efficient Cancelable Iris Template Generation for Wearable Sensors. 7473591:1-7473591:13 - Qinglan Zhao, Shuntong Yang, Dong Zheng

, Baodong Qin
:
A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things. 8105787:1-8105787:8 - Tao Wang

, Bo Yang
, Guoyong Qiu, Lina Zhang
, Yong Yu
, Yanwei Zhou
, Juncai Guo
:
An Approach Enabling Various Queries on Encrypted Industrial Data Stream. 6293970:1-6293970:12 - Zeeshan Ali Khan

, Peter Herrmann
:
Recent Advancements in Intrusion Detection Systems for the Internet of Things. 4301409:1-4301409:19 - Qihua Wang

, Huaqun Wang
, Yufeng Wang, Rui Guo:
A Distributed Access Control with Outsourced Computation in Fog Computing. 6782753:1-6782753:10 - Bo Feng, Qiang Li

, Yuede Ji
, Dong Guo
, Xiangyu Meng
:
Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users. 3053418:1-3053418:14 - Ashwag Albakri

, Lein Harn, Sejun Song:
Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN). 3950129:1-3950129:11 - Markus Heinrich

, Tsvetoslava Vateva-Gurova, Tolga Arul
, Stefan Katzenbeisser, Neeraj Suri
, Henk Birkholz, Andreas Fuchs, Christoph Krauß
, Maria Zhdanova
, Don Kuzhiyelil, Sergey Tverdyshev, Christian Schlehuber:
Security Requirements Engineering in Safety-Critical Railway Signalling Networks. 8348925:1-8348925:14 - Dan Lu

, Qilong Han
, Kejia Zhang
, Haitao Zhang, Bisma Gull:
A Novel Method for Location Privacy Protection in LBS Applications. 1914038:1-1914038:11 - Jie Cai

, Han Jiang
, Pingyuan Zhang
, Zhihua Zheng, Hao Wang
, Guangshi Lü, Qiuliang Xu:
ID-Based Strong Designated Verifier Signature over ℛ-SIS Assumption. 9678095:1-9678095:8 - Zhuoqun Xia, Zhenwei Fang, Fengfei Zou, Jin Wang

, Arun Kumar Sangaiah
:
Research on Defensive Strategy of Real-Time Price Attack Based on Multiperson Zero-Determinant. 6956072:1-6956072:13 - Zhen Qu, Ivan B. Djordjevic

:
Comment on "Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment". 1484593:1 - Madiha Khalid

, Umar Mujahid Khokhar
, Muhammad Najam-ul-Islam:
Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags. 3295616:1-3295616:25 - Daniel Schneider

, Jens Braband, Erwin Schoitsch, Sascha Uhrig, Stefan Katzenbeisser:
Safety and Security Coengineering in Embedded Systems. 5381856:1-5381856:2 - Omar Iraqi

, Hanan El Bakkali
:
Application-Level Unsupervised Outlier-Based Intrusion Detection and Prevention. 8368473:1-8368473:13 - Kenan Kingsley Phiri, Hyunsung Kim

:
Linear (t, n) Secret Sharing Scheme with Reduced Number of Polynomials. 5134534:1-5134534:16 - Yaojun Hao

, Fuzhi Zhang
, Jian Wang, Qingshan Zhao, Jianfang Cao
:
Detecting Shilling Attacks with Automatic Features from Multiple Views. 6523183:1-6523183:13 - Abd Elghaffar M. Elhady

, Hazem M. El-Bakry
, Ahmed Abou Elfetouh:
Comprehensive Risk Identification Model for SCADA Systems. 3914283:1-3914283:24 - Olawale Surajudeen Adebayo

, Normaziah Abdul Aziz
:
Improved Malware Detection Model with Apriori Association Rule and Particle Swarm Optimization. 2850932:1-2850932:13 - Mingyong Yin

, Xingshu Chen
, Qixu Wang
, Wei Wang
, Yulong Wang
:
Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT. 6803801:1-6803801:14 - Feifei Wang

, Guoai Xu
, Lize Gu:
A Secure and Efficient ECC-Based Anonymous Authentication Protocol. 4656281:1-4656281:13 - Yanping Shen

, Kangfeng Zheng, Chunhua Wu
, Yixian Yang:
A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection. 1283495:1-1283495:9 - Keita Emura

, Goichiro Hanaoka
, Yutaka Kawai, Takahiro Matsuda, Kazuma Ohara
, Kazumasa Omote, Yusuke Sakai
:
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions. 4872403:1-4872403:36 - Yunpeng Gao

, Nan Zhang
:
Social Security and Privacy for Social IoT Polymorphic Value Set: A Solution to Inference Attacks on Social Networks. 5498375:1-5498375:16 - Ping Qi

, Fucheng Wang
, Shu Hong
:
A Novel Trust Model Based on Node Recovery Technique for WSN. 2545129:1-2545129:12 - Pelin Angin

, Bharat K. Bhargava, Rohit Ranchal
:
Big Data Analytics for Cyber Security. 4109836:1-4109836:2 - Paolo Santini

, Giuseppe Gottardi
, Marco Baldi
, Franco Chiaraluce
:
A Data-Driven Approach to Cyber Risk Assessment. 6716918:1-6716918:8 - Haiyan Xu

, Zhaoxin Zhang, Jianen Yan
, Xin Ma:
Evaluating the Impact of Name Resolution Dependence on the DNS. 8565397:1-8565397:12 - Zhuo Zhang

, Guangyuan Fu, Fuqiang Di
, Changlong Li
, Jia Liu:
Generative Reversible Data Hiding by Image-to-Image Translation via GANs. 4932782:1-4932782:10 - Jinrong Bai

, Qibin Shi
, Shiguang Mu
:
A Malware and Variant Detection Method Using Function Call Graph Isomorphism. 1043794:1-1043794:12 - Cheng Huang

, Jiaxuan Han, Xing Zhang, Jiayong Liu
:
Automatic Identification of Honeypot Server Using Machine Learning Techniques. 2627608:1-2627608:8 - Emre Gürbüz

, Güzin Ulutas, Mustafa Ulutas
:
Detection of Free-Form Copy-Move Forgery on Digital Images. 8124521:1-8124521:14 - Mariusz Kamola

:
Sensitivity of Importance Metrics for Critical Digital Services Graph to Service Operators' Self-Assessment Errors. 7510809:1-7510809:8 - Woorim Bang, Ji Won Yoon

:
Power Grid Estimation Using Electric Network Frequency Signals. 1982168:1-1982168:11 - Lin Zhang

, Li Li, Eric Medwedeff, Haiping Huang
, Xiong Fu
, Ruchuan Wang:
Privacy Protection of Social Networks Based on Classified Attribute Encryption. 9108759:1-9108759:14 - Yingxu Lai

, Jingwen Zhang, Zenghui Liu
:
Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network. 8124254:1-8124254:11 - Bo Han

, Yinliang Zhao, Changpeng Zhu
:
An Object Proxy-Based Dynamic Layer Replacement to Protect IoMT Applications. 2798571:1-2798571:9 - Chuan Yu

, Shuhui Chen
, Zhiping Cai
:
LTE Phone Number Catcher: A Practical Attack against Mobile Privacy. 7425235:1-7425235:10 - Daegeon Kim

, Huy Kang Kim
:
Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis. 6268476:1-6268476:10 - Dan Yamamoto

, Wakaha Ogata
:
Multidivisible Online/Offline Cryptography and Its Application to Signcryptions. 1042649:1-1042649:21 - En Zhang

, Jun-Zhe Zhu, Gong-Li Li, Jian Chang, Yu Li:
Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation. 6989383:1-6989383:8 - Francisco Sales de Lima Filho

, Frederico Augusto Fernandes Silveira
, Agostinho de Medeiros Brito Júnior, Genoveva Vargas-Solar
, Luiz Felipe Q. Silveira
:
Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning. 1574749:1-1574749:15 - Haisheng Yu

, Keqiu Li, Heng Qi
:
An Active Controller Selection Scheme for Minimizing Packet-In Processing Latency in SDN. 1949343:1-1949343:11 - Mi-Jung Choi

, Jiwon Bang
, Jongwook Kim, Hajin Kim, Yang-Sae Moon
:
All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis. 5278137:1-5278137:16 - Baek Kyung Song, Joon Soo Yoo, Miyeon Hong, Ji Won Yoon

:
A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms. 3648671:1-3648671:14 - Hefeng Chen

, Hsiao-Ling Wu, Chin-Chen Chang
, Long-Sheng Chen
:
Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data. 9060756:1-9060756:7 - Konstantinos Rantos

, George Drosatos
, Antonios Kritsas
, Christos Ilioudis
, Alexandros Papanikolaou
, Adam P. Filippidis:
A Blockchain-Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem. 1431578:1-1431578:15 - Jiaye Pan

, Yi Zhuang
, Binglin Sun:
Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs. 8467081:1-8467081:22 - Weiping Wang, Feng Zhang, Xi Luo, Shigeng Zhang:

PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks. 2595794:1-2595794:15 - Muhammad Zain ul Abideen

, Shahzad Saleem
, Madiha Ejaz
:
VPN Traffic Detection in SSL-Protected Channel. 7924690:1-7924690:17 - Rameez Asif

, William J. Buchanan
:
Corrigendum to "Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment". 2637028:1 - Mohammad Faisal

, Sohail Abbas
, Haseeb Ur Rahman, Muhammad Zahid Khan
, Arif Ur Rahman
:
An Analysis of DDoS Attacks on the Instant Messengers. 1751285:1-1751285:8 - Jun Wang

, Feixiang Luo, Zequan Zhou
, Xiling Luo, Zhen Wang:
Optimistic Fair Exchange in Cloud-Assisted Cyber-Physical Systems. 5175076:1-5175076:14 - Shuaiwei Zhang

, Xiaoyuan Yang
, Lin Chen, Weidong Zhong:
A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition. 6124165:1-6124165:10 - Yi Zhao

, Kaitai Liang
, Bo Yang
, Liqun Chen
:
CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs. 8357241:1-8357241:8 - Junwei Tang

, Jingjing Li, Ruixuan Li
, Hongmu Han, Xiwu Gu, Zhiyong Xu
:
SSLDetecter: Detecting SSL Security Vulnerabilities of Android Applications Based on a Novel Automatic Traversal Method. 7193684:1-7193684:20 - Pyung-Han Kim

, Eun-Jun Yoon, Kwan-Woo Ryu
, Ki-Hyun Jung
:
Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images. 9038650:1-9038650:11 - Muhua Liu

, Ping Zhang
, Qingtao Wu
:
A Novel Construction of Constrained Verifiable Random Functions. 4187892:1-4187892:15 - Yahong Xu

, Geng Yang
, Shuangjie Bai
:
Laplace Input and Output Perturbation for Differentially Private Principal Components Analysis. 9169802:1-9169802:10 - Dong Wang

, Xiaosong Zhang
, Ting Chen, Jingwei Li:
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface. 5076324:1-5076324:19 - Ping Zhang

, Yamin Li
, Muhua Liu
:
An Indistinguishably Secure Function Encryption Scheme. 8567534:1-8567534:10 - A. Karimi Rizi

, Mohammad Naderi Dehkordi
, N. Nemat bakhsh:
SNI: Supervised Anonymization Technique to Publish Social Networks Having Multiple Sensitive Labels. 8171263:1-8171263:23 - Weina Niu

, Ting Li, Xiaosong Zhang
, Teng Hu
, Tianyu Jiang, Heng Wu:
Using XGBoost to Discover Infected Hosts Based on HTTP Traffic. 2182615:1-2182615:11 - Xin Ma, Shize Guo, Wei Bai

, Jun Chen, Shiming Xia, Zhisong Pan
:
An API Semantics-Aware Malware Detection Method Based on Deep Learning. 1315047:1-1315047:9 - Dainius Ceponis

, Nikolaj Goranin
:
Evaluation of Deep Learning Methods Efficiency for Malicious and Benign System Calls Classification on the AWSCTD. 2317976:1-2317976:12 - Bin Yu

, Zhengxin Fu
, Sijia Liu
:
A Novel Three-Layer QR Code Based on Secret Sharing Scheme and Liner Code. 7937816:1-7937816:13 - Sijie Fan

, Yaqun Zhao:
Analysis of DES Plaintext Recovery Based on BP Neural Network. 9580862:1-9580862:5 - Ignazio Pedone

, Antonio Lioy, Fulvio Valenza
:
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions. 2425983:1-2425983:11 - Claudio Urrea

, Claudio Morales
:
Enhancing Modbus-RTU Communications for Smart Metering in Building Energy Management Systems. 7010717:1-7010717:8 - Langtao Hu

, Xin Zheng, Chunsheng Chen:
Physical Layer Security in Nonorthogonal Multiple Access Wireless Network with Jammer Selection. 7869317:1-7869317:9 - Marwan Ali Albahar

:
Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments. 8939041:1-8939041:9 - Yibin Xu

, Yangyu Huang
:
MWPoW: Multiple Winners Proof of Work Protocol, a Decentralisation Strengthened Fast-Confirm Blockchain Protocol. 3674274:1-3674274:13 - Lin Ding

, Lei Wang, Dawu Gu
, Chenhui Jin, Jie Guan:
Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping. 7429320:1-7429320:5 - R. B. Benisha

, S. Raja Ratna
:
Design of Intrusion Detection and Prevention in SCADA System for the Detection of Bias Injection Attacks. 1082485:1-1082485:12 - Yixin Wu

, Yuqiang Sun
, Cheng Huang
, Peng Jia, Luping Liu:
Session-Based Webshell Detection Using Machine Learning in Web Logs. 3093809:1-3093809:11 - Dimitrios Kosmanos

, Antonios Argyriou
, Leandros A. Maglaras
:
Estimating the Relative Speed of RF Jammers in VANETs. 2064348:1-2064348:18 - Hui Gao

, Yunfang Chen, Wei Zhang
:
Detection of Trojaning Attack on Neural Networks via Cost of Sample Classification. 1953839:1-1953839:12 - Xiaohu Liu

, Hengwei Zhang
, Yuchen Zhang, Lulu Shao, Jihong Han:
Active Defense Strategy Selection Method Based on Two-Way Signaling Game. 1362964:1-1362964:14 - Chen Pan, Guodong Ye

, Xiaoling Huang
, Junwei Zhou
:
Novel Meaningful Image Encryption Based on Block Compressive Sensing. 6572105:1-6572105:12 - Imran Shahzad

, Qaiser Mushtaq, Abdul Razaq
:
Construction of New S-Box Using Action of Quotient of the Modular Group for Multimedia Security. 2847801:1-2847801:13 - Jiageng Chen

, Chunhua Su, Zheng Yan
:
AI-Driven Cyber Security Analytics and Privacy Protection. 1859143:1-1859143:2 - Quanrun Li, Ching-Fang Hsu

, Kim-Kwang Raymond Choo, Debiao He
:
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks. 7871067:1-7871067:13 - Ankang Chu, Yingxu Lai

, Jing Liu
:
Industrial Control Intrusion Detection Approach Based on Multiclassification GoogLeNet-LSTM Model. 6757685:1-6757685:11 - Jiaqing Mo

, Hang Chen
:
A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks. 2136506:1-2136506:17 - Aysha Shabbir, Maryam Shabbir, Muhammad Rizwan

, Fahad Ahmad
:
Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard. 2509898:1-2509898:16 - Huicong Liang

, Meiqin Wang
:
Cryptanalysis of the Lightweight Block Cipher BORON. 7862738:1-7862738:12 - Guofeng Lin

, Yunhao Xia, Chun Ying, Zhixin Sun
:
F2P-ABS: A Fast and Secure Attribute-Based Signature for Mobile Platforms. 5380710:1-5380710:12 - Mee Lan Han

, Byung Il Kwak
, Huy Kang Kim
:
CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis. 1901548:1-1901548:21 - Yuchen Zhang

, Jing Liu
:
Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning. 3038586:1-3038586:16 - Lin Li

, Chin-Chen Chang
, Hefeng Chen
:
An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy. 3031506:1-3031506:17 - Jingang Liu, Yongge Wang, Zongxiang Yi, Zhiqiang Lin

:
polarRLCE: A New Code-Based Cryptosystem Using Polar Codes. 3086975:1-3086975:10 - Jianping Zeng

, Shuang Wu, Yanyu Chen, Rui Zeng, Chengrong Wu:
Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge Processing. 2031063:1-2031063:16 - Zhidong Shen

, Yuhao Zhang, Weiying Chen:
A Bayesian Classification Intrusion Detection Method Based on the Fusion of PCA and LDA. 6346708:1-6346708:11 - Abdulrahman Al-Dailami

, Chang Ruan
, Zhihong Bao
, Tao Zhang
:
QoS3: Secure Caching in HTTPS Based on Fine-Grained Trust Delegation. 3107543:1-3107543:16 - Tran Nghi Phu

, Kien Hoang Dang, Dung Ngo Quoc, Nguyen Dai Tho, Nguyen Ngoc Binh:
A Novel Framework to Classify Malware in MIPS Architecture-Based IoT Devices. 4073940:1-4073940:13 - Bohun Kim

, Junghoon Cho, Byungjun Choi, Jongsun Park, Hwajeong Seo
:
Compact Implementations of HIGHT Block Cipher on IoT Platforms. 5323578:1-5323578:10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














