Search dblp for Publications

export results for "toc:db/journals/sesa/sesa8.bht:"

 download as .bib file

@article{DBLP:journals/sesa/AkhtarF22,
  author       = {Muhammad Shoaib Akhtar and
                  Tao Feng},
  title        = {A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms
                  over {IOT} Layers},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {30},
  pages        = {5},
  year         = {2022},
  url          = {https://doi.org/10.4108/eetss.v8i30.590},
  doi          = {10.4108/EETSS.V8I30.590},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/AkhtarF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HuangTY22,
  author       = {Zhen Huang and
                  Gang Tan and
                  Xiaowei Yu},
  title        = {Mitigating Vulnerabilities in Closed Source Software},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {30},
  pages        = {4},
  year         = {2022},
  url          = {https://doi.org/10.4108/eetss.v8i30.253},
  doi          = {10.4108/EETSS.V8I30.253},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/HuangTY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LuLFI22,
  author       = {Yang Lu and
                  Shujun Li and
                  Alex Alves Freitas and
                  Athina Ioannou},
  title        = {How data-sharing nudges influence people's privacy preferences: {A}
                  machine learning-based analysis},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {30},
  pages        = {3},
  year         = {2022},
  url          = {https://doi.org/10.4108/eai.21-12-2021.172440},
  doi          = {10.4108/EAI.21-12-2021.172440},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/LuLFI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MalikT22,
  author       = {Adeel A. Malik and
                  Deepak K. Tosh},
  title        = {Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical
                  Systems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {30},
  pages        = {1},
  year         = {2022},
  url          = {https://doi.org/10.4108/eai.25-1-2022.172997},
  doi          = {10.4108/EAI.25-1-2022.172997},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/MalikT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/WagnerBKC22,
  author       = {Anne Wagner and
                  Anna Bakas and
                  Shelia Kennison and
                  Eric Chan{-}Tin},
  title        = {Comparing Online Surveys for Cybersecurity: {SONA} and MTurk},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {30},
  pages        = {2},
  year         = {2022},
  url          = {https://doi.org/10.4108/eai.8-2-2022.173334},
  doi          = {10.4108/EAI.8-2-2022.173334},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/WagnerBKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/BakasWJKC21,
  author       = {Anna Bakas and
                  Anne Wagner and
                  Spencer Johnston and
                  Shelia Kennison and
                  Eric Chan{-}Tin},
  title        = {Impact of Personality Types and Matching Messaging on Password Strength},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {28},
  pages        = {e1},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.1-6-2021.170012},
  doi          = {10.4108/EAI.1-6-2021.170012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/BakasWJKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/BasseyLQ21,
  author       = {Joshua Bassey and
                  Xiangfang Li and
                  Lijun Qian},
  title        = {Device Authentication Codes based on {RF} Fingerprinting using Deep
                  Learning},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {29},
  pages        = {e5},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.30-11-2021.172305},
  doi          = {10.4108/EAI.30-11-2021.172305},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/BasseyLQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HaCLSJ21,
  author       = {Guanxiong Ha and
                  Hang Chen and
                  Ruiqi Li and
                  Wei Shao and
                  Chunfu Jia},
  title        = {A Rekeying Scheme for Encrypted Deduplication Storage based on {NTRU}},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {27},
  pages        = {e4},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.25-6-2021.170248},
  doi          = {10.4108/EAI.25-6-2021.170248},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/HaCLSJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HasanSUHI21,
  author       = {Kamrul Hasan and
                  Sachin Shetty and
                  Sharif Ullah and
                  Amin Hassanzadeh and
                  Tariqul Islam},
  title        = {Criticality based Optimal Cyber Defense Remediation in Energy Delivery
                  Systems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {28},
  pages        = {e5},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.10-9-2021.170949},
  doi          = {10.4108/EAI.10-9-2021.170949},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/HasanSUHI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HuffL21,
  author       = {Philip Dale Huff and
                  Qinghua Li},
  title        = {Towards Automating the Assessment of Software Vulnerability Risk},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {27},
  pages        = {e3},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.25-6-2021.170247},
  doi          = {10.4108/EAI.25-6-2021.170247},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/HuffL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/JinW21,
  author       = {Qiuqing Jin and
                  Liming Wang},
  title        = {Zero-Trust Based Distributed Collaborative Dynamic Access Control
                  Scheme with Deep Multi-Agent Reinforcement Learning},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {27},
  pages        = {e2},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.25-6-2021.170246},
  doi          = {10.4108/EAI.25-6-2021.170246},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/JinW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/KosinskiSF21,
  author       = {Tomasz Kosinski and
                  Riccardo Scandariato and
                  Morten Fjeld},
  title        = {SyntIoT: Privacy and security experimentation in consumer-oriented
                  IoT ecosystems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {27},
  pages        = {e1},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.25-6-2021.170245},
  doi          = {10.4108/EAI.25-6-2021.170245},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/KosinskiSF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LiuV21,
  author       = {Hong Liu and
                  Eugene Y. Vasserman},
  title        = {Side-channel Programming for Software Integrity Checking},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {28},
  pages        = {e2},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.2-6-2021.170013},
  doi          = {10.4108/EAI.2-6-2021.170013},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/LiuV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LiuZ21,
  author       = {Zheyuan Liu and
                  Rui Zhang},
  title        = {Privacy Preserving Collaborative Machine Learning},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {28},
  pages        = {e3},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.14-7-2021.170295},
  doi          = {10.4108/EAI.14-7-2021.170295},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/LiuZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LuoHZZL21,
  author       = {Zhengping Luo and
                  Tao Hou and
                  Xiangrong Zhou and
                  Hui Zeng and
                  Zhuo Lu},
  title        = {Binary Code Similarity Detection through {LSTM} and Siamese Neural
                  Network},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {29},
  pages        = {e1},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.14-9-2021.170956},
  doi          = {10.4108/EAI.14-9-2021.170956},
  timestamp    = {Mon, 19 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/LuoHZZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MlikiKC21,
  author       = {Hela Mliki and
                  Abir Hadj Kaceam and
                  Lamia Chaari},
  title        = {A Comprehensive Survey on Intrusion Detection based Machine Learning
                  for IoT Networks},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {29},
  pages        = {e3},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.6-10-2021.171246},
  doi          = {10.4108/EAI.6-10-2021.171246},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/MlikiKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/PanYL21,
  author       = {Shiying Pan and
                  Can Yang and
                  Runmin Li},
  title        = {{GIP3:} Make Privacy Preserving be Easier on Cloud},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {27},
  pages        = {e5},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.25-6-2021.170249},
  doi          = {10.4108/EAI.25-6-2021.170249},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/PanYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/PathakPRC21,
  author       = {Prabesh Pathak and
                  Prabesh Poudel and
                  Sankardas Roy and
                  Doina Caragea},
  title        = {Leveraging attention-based deep neural networks for security vetting
                  of Android applications},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {29},
  pages        = {e2},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.27-9-2021.171168},
  doi          = {10.4108/EAI.27-9-2021.171168},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/PathakPRC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/RahmanDA21,
  author       = {Mohammad Ashiqur Rahman and
                  Amarjit Datta and
                  Ehab Al{-}Shaer},
  title        = {Automated Configuration Synthesis for Resilient Smart Metering Infrastructure},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {28},
  pages        = {e4},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.10-9-2021.170948},
  doi          = {10.4108/EAI.10-9-2021.170948},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/RahmanDA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/YangLY21,
  author       = {Zezhang Yang and
                  Jian Li and
                  Ping Yang},
  title        = {FedADMP: {A} Joint Anomaly Detection and Mobility Prediction Framework
                  via Federated Learning},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {29},
  pages        = {e4},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.21-10-2021.171595},
  doi          = {10.4108/EAI.21-10-2021.171595},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/YangLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}