Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 5 of 128 results
Sort by: relevance publication year

Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone

JOURNAL ARTICLE published 30 June 2020 in ICST Transactions on Security and Safety

Authors: Yuan He | Wenjie Wang | Hongyu Sun | Yuqing Zhang

Shoal: A Network Level Moving Target Defense Engine with Software Defined Networking

JOURNAL ARTICLE published 1 June 2021 in ICST Transactions on Security and Safety

Authors: Li Wang

A framework for usable end-user privacy control in social software systems

JOURNAL ARTICLE published 27 September 2011 in ICST Transactions on Security and Safety

Authors: Maryam Najafian Razavi | Denis Gillet

FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things

JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety

Authors: V. Kamalakannan | S. Tamilselvan

GIP3: Make Privacy Preserving be Easier on Cloud

JOURNAL ARTICLE published 12 January 2021 in ICST Transactions on Security and Safety

Authors: Shiying Pan | Can Yang | Runmin Li

Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications

JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety

Authors: Wenyu Qu | Wei Huo | Lingyu Wang

Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems

JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety

Authors: Qais Tasali | Christine Sublett | Eugene Vasserman

Monitoring and Improving Managed Security Services inside a Security Operation Center

JOURNAL ARTICLE published 8 April 2019 in ICST Transactions on Security and Safety

Authors: Mina Khalili | Mengyuan Zhang | Daniel Borbor | Lingyu Wang | Nicandro Scarabeo | Michel-Ange Zamor

Manipulating Users’ Trust on Amazon Echo: Compromising Smart Home from Outside

JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety

Authors: Yuxuan Chen | Xuejing Yuan | Aohui Wang | Kai Chen | Shengzhi Zhang | Heqing Huang

Binary Code Similarity Detection through LSTM and Siamese Neural Network

JOURNAL ARTICLE published 30 November 2021 in ICST Transactions on Security and Safety

Authors: Zhengping Luo | Tao Hou | Xiangrong Zhou | Hui Zeng | Zhuo Lu

Overview of Romania 802.11Wireless Security & Statistics

JOURNAL ARTICLE published 28 December 2017 in ICST Transactions on Security and Safety

Authors: Cristian Liviu Leca

Towards Privacy-Preserving Web Metering Via User-Centric Hardware

JOURNAL ARTICLE published 5 October 2015 in ICST Transactions on Security and Safety

Authors: Fahad Alarfi | Maribel Fernández

Identify Vulnerability Fix Commits Automatically Using Hierarchical Attention Network

JOURNAL ARTICLE published 30 June 2020 in ICST Transactions on Security and Safety

Authors: Mingxin Sun | Wenjie Wang | Hantao Feng | Hongu Sun | Yuqing Zhang

Do Metadata-based Deleted-File-Recovery (DFR) Tools Meet NIST Guidelines?

JOURNAL ARTICLE published 19 August 2019 in ICST Transactions on Security and Safety

Authors: Andrew Meyer | Sankardas Roy

Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs

JOURNAL ARTICLE published 28 December 2017 in ICST Transactions on Security and Safety

Authors: Qi Dong | Zekun Yang | Yu Chen | Xiaohua Li | Kai Zeng

Toward A Network-Assisted Approach for Effective Ransomware Detection

JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety

Authors: Tianrou Xia | Yuanyi Sun | Sencun Zhu | Zeeshan Rasheed | Khurram Shafique

Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications

JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety

Authors: Kalikinkar Mandal | Guang Gong

WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices

JOURNAL ARTICLE published 30 January 2015 in ICST Transactions on Security and Safety

Authors: Xinxin Fan | Kalikinkar Mandal | Guang Gong

Salus: Kernel Support for Secure Process Compartments

JOURNAL ARTICLE published 30 January 2015 in ICST Transactions on Security and Safety

Authors: Raoul Strackx | Pieter Agten | Niels Avonds | Frank Piessens

MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks

JOURNAL ARTICLE published 7 December 2017 in ICST Transactions on Security and Safety

Authors: Subramaniyam Kannan | Paul Wood | Somali Chaterji | Saurabh Bakchi | Larry Deatrick | Patricia Beane