Facet browsing currently unavailable
Page 4 of 128 results
Sort by: relevance publication year
Side-channel Programming for Software Integrity Checking JOURNAL ARTICLE published 10 September 2021 in ICST Transactions on Security and Safety |
A Comprehensive Survey on Intrusion Detection based Machine Learning for IoT Networks JOURNAL ARTICLE published 30 November 2021 in ICST Transactions on Security and Safety |
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks JOURNAL ARTICLE published 7 December 2017 in ICST Transactions on Security and Safety |
Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety |
Preface to special issue on miscellaneous emerging security problems JOURNAL ARTICLE published 5 October 2015 in ICST Transactions on Security and Safety |
Zero-Trust Based Distributed Collaborative Dynamic Access Control Scheme with Deep Multi-Agent Reinforcement Learning JOURNAL ARTICLE published 12 January 2021 in ICST Transactions on Security and Safety |
Towards Scalability Trade-off and Security Issues in State-of-the-art Blockchain JOURNAL ARTICLE published 8 April 2019 in ICST Transactions on Security and Safety |
Bridging the Gap Between Security Tools and SDN Controllers JOURNAL ARTICLE published 10 January 2019 in ICST Transactions on Security and Safety |
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety |
How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety |
Forget the Myth of the Air Gap: Machine Learning for Reliable Intrusion Detection in SCADA Systems JOURNAL ARTICLE published 29 January 2019 in ICST Transactions on Security and Safety |
Efficient, Effective, and Realistic Website Fingerprinting Mitigation JOURNAL ARTICLE published 29 April 2019 in ICST Transactions on Security and Safety |
Framing the Human Dimension in Cybersecurity JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety |
An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety |
AMASS: Automated Software Mass Customization via Feature Identification and Tailoring JOURNAL ARTICLE published 29 April 2019 in ICST Transactions on Security and Safety |
Evaluating the Impact of Sandbox Applications on Live Digital Forensics Investigation JOURNAL ARTICLE published 1 June 2021 in ICST Transactions on Security and Safety |
Security of HPC Systems: From a Log-analyzing Perspective JOURNAL ARTICLE published 19 August 2019 in ICST Transactions on Security and Safety |
Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems JOURNAL ARTICLE published 10 September 2021 in ICST Transactions on Security and Safety |
Development of a Multifactor-Security-Protocol System Using Ambient Noise Synthesis JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety |
Differentially Private High-Dimensional Data Publication via Markov Network JOURNAL ARTICLE published 29 January 2019 in ICST Transactions on Security and Safety |