Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 3 of 128 results
Sort by: relevance publication year

Mouse Underlaying: Global Key and Mouse Listener Based on an Almost Invisible Window with Local Listeners and Sophisticated Focus

JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety

Authors: Tim Witte

Leveraging attention-based deep neural networks for security vetting of Android applications

JOURNAL ARTICLE published 30 November 2021 in ICST Transactions on Security and Safety

Authors: Prabesh Pathak | Prabesh Poudel | Sankardas Roy | Doina Caragea

An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process

JOURNAL ARTICLE published 4 January 2018 in ICST Transactions on Security and Safety

Authors: Chu Huang | Sencun Zhu | Yi Yang

Privacy Preserving Collaborative Machine Learning

JOURNAL ARTICLE published 10 September 2021 in ICST Transactions on Security and Safety

Authors: Zheyuan Liu | Rui Zhang

How did you know that about me? Protecting users against unwanted inferences

JOURNAL ARTICLE published 27 September 2011 in ICST Transactions on Security and Safety

Authors: Sara Motahari | Julia Mayer | Quentin Jones

deMSF: a Method for Detecting Malicious Server Flocks for Same Campaign

JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety

Authors: Yixin Li | Liming Wang | Jing Yang | Zhen Xu | Xi Luo

HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware

JOURNAL ARTICLE published 8 April 2019 in ICST Transactions on Security and Safety

Authors: Chonghua Wang | Libo Yin | Jun Li | Xuehong Chen | Rongchao Yin | Xiaochun Yun | Yang Jiao | Zhiyu Hao

Cyber situation awareness and teamwork

JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety

Authors: Nancy J. Cooke | Michael Champion | Prashanth Rajivan | Shree Jariwala

Formal Approach to Detect and Resolve Anomalies while Clustering ABAC Policies

JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety

Authors: Maryem Ait El Hadj | Ahmed Khoumsi | Yahya Benkaouz | Mohammed Erradi

Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service

JOURNAL ARTICLE published 29 April 2019 in ICST Transactions on Security and Safety

Authors: Vinay Sachidananda | Suhas Bhairav | Yuval Elovici

CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers

JOURNAL ARTICLE published 18 February 2021 in ICST Transactions on Security and Safety

Authors: Wanping Liu | Zhoulan Zhang | Cheng Huang | Yong Fang

A Multi-connection Encryption Algorithm Applied in Secure Channel Service System

JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety

Authors: Fanhao Meng | Rongheng Lin | Zhuoran Wang | Hua Zou | Shiqi Zhou

A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers

JOURNAL ARTICLE published 5 August 2022 in ICST Transactions on Security and Safety

Authors: Muhammad Shoaib Akhtar | Tao Feng

Impact of Personality Types and Matching Messaging on Password Strength

JOURNAL ARTICLE published 10 September 2021 in ICST Transactions on Security and Safety

Authors: Anna Bakas | Anne Wagner | Spencer Johnston | Shelia Kennison | Eric Chan-Tin

Defence Mechanisms for Public Systems

JOURNAL ARTICLE published 4 January 2018 in ICST Transactions on Security and Safety

Authors: Sencun Zhu | Kevin Jones | Leandros Maglaras

Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications

JOURNAL ARTICLE published 30 June 2020 in ICST Transactions on Security and Safety

Authors: Soohyun Park | Yeongeun Kang | Jeman Park | Joongheon Kim

Security, Privacy and Trust in Cyber Physical Systems

JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety

Authors: H. Janicke | Kevin Jones | L. Maglaras

A Rekeying Scheme for Encrypted Deduplication Storage based on NTRU

JOURNAL ARTICLE published 12 January 2021 in ICST Transactions on Security and Safety

Authors: GuanXiong Ha | Hang Chen | Ruiqi Li | Wei Shao | Chunfu Jia

Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering

JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety

Authors: Aziz Mohaisen | Omar Alrawi | Jeman Park | Joongheon Kim | DaeHun Nyang | Manar Mohaisen

Welcome message from the Editor-in-Chief

JOURNAL ARTICLE published 27 September 2011 in ICST Transactions on Security and Safety

Authors: Peng Liu