Facet browsing currently unavailable
Page 5 of 128 results
Sort by: relevance publication year
Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone JOURNAL ARTICLE published 30 June 2020 in ICST Transactions on Security and Safety |
Shoal: A Network Level Moving Target Defense Engine with Software Defined Networking JOURNAL ARTICLE published 1 June 2021 in ICST Transactions on Security and Safety |
A framework for usable end-user privacy control in social software systems JOURNAL ARTICLE published 27 September 2011 in ICST Transactions on Security and Safety |
FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety |
GIP3: Make Privacy Preserving be Easier on Cloud JOURNAL ARTICLE published 12 January 2021 in ICST Transactions on Security and Safety |
Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety |
Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety |
Monitoring and Improving Managed Security Services inside a Security Operation Center JOURNAL ARTICLE published 8 April 2019 in ICST Transactions on Security and Safety |
Manipulating Users’ Trust on Amazon Echo: Compromising Smart Home from Outside JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety |
Binary Code Similarity Detection through LSTM and Siamese Neural Network JOURNAL ARTICLE published 30 November 2021 in ICST Transactions on Security and Safety |
Overview of Romania 802.11Wireless Security & Statistics JOURNAL ARTICLE published 28 December 2017 in ICST Transactions on Security and Safety |
Towards Privacy-Preserving Web Metering Via User-Centric Hardware JOURNAL ARTICLE published 5 October 2015 in ICST Transactions on Security and Safety |
Identify Vulnerability Fix Commits Automatically Using Hierarchical Attention Network JOURNAL ARTICLE published 30 June 2020 in ICST Transactions on Security and Safety |
Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs JOURNAL ARTICLE published 28 December 2017 in ICST Transactions on Security and Safety |
Toward A Network-Assisted Approach for Effective Ransomware Detection JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety |
Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety |
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices JOURNAL ARTICLE published 30 January 2015 in ICST Transactions on Security and Safety |
Salus: Kernel Support for Secure Process Compartments JOURNAL ARTICLE published 30 January 2015 in ICST Transactions on Security and Safety |
MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks JOURNAL ARTICLE published 7 December 2017 in ICST Transactions on Security and Safety |
How Stakeholders Perceived Security Risks? A New Predictive Functional Level Model and its Application to E-Learning JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety |