Facet browsing currently unavailable
Page 9 of 934 results
Sort by: relevance publication year
Anomalous behavior detection-based approach for authenticating smart home system users JOURNAL ARTICLE published June 2022 in International Journal of Information Security |
Selecting parameters for secure McEliece-based cryptosystems JOURNAL ARTICLE published June 2012 in International Journal of Information Security |
DOMtegrity: ensuring web page integrity against malicious browser extensions JOURNAL ARTICLE published December 2019 in International Journal of Information Security Research funded by European Research Council (ERC Starting Grant (No. 306994)) |
Measuring and visualizing cyber threat intelligence quality JOURNAL ARTICLE published February 2021 in International Journal of Information Security Research funded by Horizon 2020 (830927) |
SealFSv2: combining storage-based and ratcheting for tamper-evident logging JOURNAL ARTICLE published April 2023 in International Journal of Information Security Research funded by Agencia Estatal de Investigación (PID2021-126592OB-C22) |
Security attacks on smart grid scheduling and their defences: a game-theoretic approach JOURNAL ARTICLE published August 2020 in International Journal of Information Security |
Systematic review of SIEM technology: SIEM-SC birth JOURNAL ARTICLE published June 2023 in International Journal of Information Security |
Intelligent and behavioral-based detection of malware in IoT spectrum sensors JOURNAL ARTICLE published June 2023 in International Journal of Information Security Research funded by Armasuisse (CYD-C-2020003,R-3210/047-31) |
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability JOURNAL ARTICLE published June 2020 in International Journal of Information Security |
Challenges of post-quantum digital signing in real-world applications: a survey JOURNAL ARTICLE published August 2022 in International Journal of Information Security Research funded by Ministry of Education (MOE2018-T2-1-111) |
On detecting co-resident cloud instances using network flow watermarking techniques JOURNAL ARTICLE published April 2014 in International Journal of Information Security |
Malware classification approaches utilizing binary and text encoding of permissions JOURNAL ARTICLE published December 2023 in International Journal of Information Security |
A method for insider threat assessment by modeling the internal employee interactions JOURNAL ARTICLE published October 2023 in International Journal of Information Security |
Token-based graphical password authentication JOURNAL ARTICLE published November 2011 in International Journal of Information Security |
Solving identity delegation problem in the e-government environment JOURNAL ARTICLE published November 2011 in International Journal of Information Security |
A deep learning approach based on multi-view consensus for SQL injection detection JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
Vulnerability discovery based on source code patch commit mining: a systematic literature review JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
Maritime cybersecurity: protecting digital seas JOURNAL ARTICLE published April 2024 in International Journal of Information Security |
Evading malware classifiers using RL agent with action-mask JOURNAL ARTICLE published December 2023 in International Journal of Information Security |
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems JOURNAL ARTICLE published April 2024 in International Journal of Information Security |