Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 4 of 128 results
Sort by: relevance publication year

Side-channel Programming for Software Integrity Checking

JOURNAL ARTICLE published 10 September 2021 in ICST Transactions on Security and Safety

Authors: Hong Liu | Eugene Vasserman

A Comprehensive Survey on Intrusion Detection based Machine Learning for IoT Networks

JOURNAL ARTICLE published 30 November 2021 in ICST Transactions on Security and Safety

Authors: Hela Mliki | Abir Kaceam | Lamia Chaari

Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks

JOURNAL ARTICLE published 7 December 2017 in ICST Transactions on Security and Safety

Authors: Yongfeng Li | Jinbing Ouyang | Bing Mao | Kai Ma | Shanqing Guo

Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories

JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety

Authors: Mazen Alwadi | Amro Awad

Preface to special issue on miscellaneous emerging security problems

JOURNAL ARTICLE published 5 October 2015 in ICST Transactions on Security and Safety

Authors: Kai Chen | Jun Shao

Zero-Trust Based Distributed Collaborative Dynamic Access Control Scheme with Deep Multi-Agent Reinforcement Learning

JOURNAL ARTICLE published 12 January 2021 in ICST Transactions on Security and Safety

Authors: Qiuqing Jin | Liming Wang

Towards Scalability Trade-off and Security Issues in State-of-the-art Blockchain

JOURNAL ARTICLE published 8 April 2019 in ICST Transactions on Security and Safety

Authors: Debasis Gountia

Bridging the Gap Between Security Tools and SDN Controllers

JOURNAL ARTICLE published 10 January 2019 in ICST Transactions on Security and Safety

Authors: Li Wang | Dinghao Wu

Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering

JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety

Authors: Aziz Mohaisen | Omar Alrawi | Jeman Park | Joongheon Kim | DaeHun Nyang | Manar Mohaisen

How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis

JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety

Authors: Yang Lu | Shujun Li | Alex Freitas | Athina Ioannou

Forget the Myth of the Air Gap: Machine Learning for Reliable Intrusion Detection in SCADA Systems

JOURNAL ARTICLE published 29 January 2019 in ICST Transactions on Security and Safety

Authors: Rocio Lopez Perez | Florian Adamsky | Ridha Soua | Thomas Engel

Efficient, Effective, and Realistic Website Fingerprinting Mitigation

JOURNAL ARTICLE published 29 April 2019 in ICST Transactions on Security and Safety

Authors: Weiqi Cui | Jiangmin Yu | Yanmin Gong | Eric Chan-Tin

Framing the Human Dimension in Cybersecurity

JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety

Authors: J. Nixon | B. McGuinness

An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks

JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety

Authors: Zheng Wang | Shui Yu | Scott Rose

AMASS: Automated Software Mass Customization via Feature Identification and Tailoring

JOURNAL ARTICLE published 29 April 2019 in ICST Transactions on Security and Safety

Authors: Hongfa Xue | Yurong Chen | Guru Venkataramani | Tian Lan

Evaluating the Impact of Sandbox Applications on Live Digital Forensics Investigation

JOURNAL ARTICLE published 1 June 2021 in ICST Transactions on Security and Safety

Authors: Reem Bashir | Helge Janicke | Wen Zeng

Security of HPC Systems: From a Log-analyzing Perspective

JOURNAL ARTICLE published 19 August 2019 in ICST Transactions on Security and Safety

Authors: Zhengping Luo | Zhe Qu | Tung Nguyen | Hui Zeng | Zhuo Lu

Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems

JOURNAL ARTICLE published 10 September 2021 in ICST Transactions on Security and Safety

Authors: Kamrul Hasan | Sachin Shetty | Md. Ullah | Amin Hassanzadeh | Tariqul Islam

Development of a Multifactor-Security-Protocol System Using Ambient Noise Synthesis

JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety

Authors: Agbotiname Imoize | Boluwatife Ben-Adeola | John Adebisi

Differentially Private High-Dimensional Data Publication via Markov Network

JOURNAL ARTICLE published 29 January 2019 in ICST Transactions on Security and Safety

Authors: Wei Zhang | Jingwen Zhao | Fengqiong Wei | Yunfang Chen