Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 128 results
Sort by: relevance publication year

An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks

JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety

Authors: Zheng Wang | Shui Yu | Scott Rose

AMASS: Automated Software Mass Customization via Feature Identification and Tailoring

JOURNAL ARTICLE published 29 April 2019 in ICST Transactions on Security and Safety

Authors: Hongfa Xue | Yurong Chen | Guru Venkataramani | Tian Lan

Evaluating the Impact of Sandbox Applications on Live Digital Forensics Investigation

JOURNAL ARTICLE published 1 June 2021 in ICST Transactions on Security and Safety

Authors: Reem Bashir | Helge Janicke | Wen Zeng

Security of HPC Systems: From a Log-analyzing Perspective

JOURNAL ARTICLE published 19 August 2019 in ICST Transactions on Security and Safety

Authors: Zhengping Luo | Zhe Qu | Tung Nguyen | Hui Zeng | Zhuo Lu

Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems

JOURNAL ARTICLE published 10 September 2021 in ICST Transactions on Security and Safety

Authors: Kamrul Hasan | Sachin Shetty | Md. Ullah | Amin Hassanzadeh | Tariqul Islam

Development of a Multifactor-Security-Protocol System Using Ambient Noise Synthesis

JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety

Authors: Agbotiname Imoize | Boluwatife Ben-Adeola | John Adebisi

Differentially Private High-Dimensional Data Publication via Markov Network

JOURNAL ARTICLE published 29 January 2019 in ICST Transactions on Security and Safety

Authors: Wei Zhang | Jingwen Zhao | Fengqiong Wei | Yunfang Chen

A framework for usable end-user privacy control in social software systems

JOURNAL ARTICLE published 27 September 2011 in ICST Transactions on Security and Safety

Authors: Maryam Najafian Razavi | Denis Gillet

FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things

JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety

Authors: V. Kamalakannan | S. Tamilselvan

Overview of Romania 802.11Wireless Security & Statistics

JOURNAL ARTICLE published 28 December 2017 in ICST Transactions on Security and Safety

Authors: Cristian Liviu Leca

GIP3: Make Privacy Preserving be Easier on Cloud

JOURNAL ARTICLE published 12 January 2021 in ICST Transactions on Security and Safety

Authors: Shiying Pan | Can Yang | Runmin Li

Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications

JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety

Authors: Wenyu Qu | Wei Huo | Lingyu Wang

Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems

JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety

Authors: Qais Tasali | Christine Sublett | Eugene Vasserman

Monitoring and Improving Managed Security Services inside a Security Operation Center

JOURNAL ARTICLE published 8 April 2019 in ICST Transactions on Security and Safety

Authors: Mina Khalili | Mengyuan Zhang | Daniel Borbor | Lingyu Wang | Nicandro Scarabeo | Michel-Ange Zamor

Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone

JOURNAL ARTICLE published 30 June 2020 in ICST Transactions on Security and Safety

Authors: Yuan He | Wenjie Wang | Hongyu Sun | Yuqing Zhang

Binary Code Similarity Detection through LSTM and Siamese Neural Network

JOURNAL ARTICLE published 30 November 2021 in ICST Transactions on Security and Safety

Authors: Zhengping Luo | Tao Hou | Xiangrong Zhou | Hui Zeng | Zhuo Lu

Shoal: A Network Level Moving Target Defense Engine with Software Defined Networking

JOURNAL ARTICLE published 1 June 2021 in ICST Transactions on Security and Safety

Authors: Li Wang

Manipulating Users’ Trust on Amazon Echo: Compromising Smart Home from Outside

JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety

Authors: Yuxuan Chen | Xuejing Yuan | Aohui Wang | Kai Chen | Shengzhi Zhang | Heqing Huang

Defence Mechanisms for Public Systems

JOURNAL ARTICLE published 4 January 2018 in ICST Transactions on Security and Safety

Authors: Sencun Zhu | Kevin Jones | Leandros Maglaras

Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications

JOURNAL ARTICLE published 30 June 2020 in ICST Transactions on Security and Safety

Authors: Soohyun Park | Yeongeun Kang | Jeman Park | Joongheon Kim