Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 3 of 128 results
Sort by: relevance publication year

Toward A Network-Assisted Approach for Effective Ransomware Detection

JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety

Authors: Tianrou Xia | Yuanyi Sun | Sencun Zhu | Zeeshan Rasheed | Khurram Shafique

Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications

JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety

Authors: Kalikinkar Mandal | Guang Gong

WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices

JOURNAL ARTICLE published 30 January 2015 in ICST Transactions on Security and Safety

Authors: Xinxin Fan | Kalikinkar Mandal | Guang Gong

Salus: Kernel Support for Secure Process Compartments

JOURNAL ARTICLE published 30 January 2015 in ICST Transactions on Security and Safety

Authors: Raoul Strackx | Pieter Agten | Niels Avonds | Frank Piessens

MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks

JOURNAL ARTICLE published 7 December 2017 in ICST Transactions on Security and Safety

Authors: Subramaniyam Kannan | Paul Wood | Somali Chaterji | Saurabh Bakchi | Larry Deatrick | Patricia Beane

How Stakeholders Perceived Security Risks? A New Predictive Functional Level Model and its Application to E-Learning

JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety

Authors: N. Rjaibi | L.B.A Rabai

NIS directive: The case of Greece

JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety

Authors: Leandros Maglaras | George Drivas | Kleanthis Noou | Stylianos Rallis

Comparing Online Surveys for Cybersecurity: SONA and MTurk

JOURNAL ARTICLE published 8 February 2022 in ICST Transactions on Security and Safety

Authors: Anne Wagner | Anna Bakas | Shelia Kennison | Eric Chan-Tin

Mitigating Vulnerabilities in Closed Source Software

JOURNAL ARTICLE published 4 August 2022 in ICST Transactions on Security and Safety

Authors: Zhen Huang | Gang Tan | Xiaowei Yu

Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems

JOURNAL ARTICLE published 28 December 2017 in ICST Transactions on Security and Safety

Authors: Dr. Sencun Zhu | Dr. Kevin Jones | Dr. Leandros Maglaras

Human-centered strategies for cyber-physical systems security

JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety

Authors: E.N. Ceesay | K. Myers | P.A. Watters

A novel intrusion detection method based on OCSVM and K-means recursive clustering

JOURNAL ARTICLE published 30 January 2015 in ICST Transactions on Security and Safety

Authors: Leandros A. Maglaras | Jianmin Jiang

Do Metadata-based Deleted-File-Recovery (DFR) Tools Meet NIST Guidelines?

JOURNAL ARTICLE published 19 August 2019 in ICST Transactions on Security and Safety

Authors: Andrew Meyer | Sankardas Roy

Towards Automating the Assessment of Software Vulnerability Risk

JOURNAL ARTICLE published 12 January 2021 in ICST Transactions on Security and Safety

Authors: Philip Huff | Qinghua Li

The performance analysis of public key cryptography-based authentication

JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety

Authors: Kaiqi Xiong

Mapping of the Security Requirements of GDPR and NISD

JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety

Authors: Najmudin Saqib | Vasileios Germanos | Wen Zeng | Leandros Maglaras

A study of user experiences and network analysis on anonymity and traceability of bitcoin transactions

JOURNAL ARTICLE published 1 June 2021 in ICST Transactions on Security and Safety

Authors: M Azhar | Robert Whitehead

Privacy-Preserving Multi-Party Directory Services

JOURNAL ARTICLE published 29 January 2019 in ICST Transactions on Security and Safety

Authors: Yuzhe Tang | Kai Li | Katchaguy Areekijseree | Shuigeng Zhou | Liting Hu

Impact of Personality Types and Matching Messaging on Password Strength

JOURNAL ARTICLE published 10 September 2021 in ICST Transactions on Security and Safety

Authors: Anna Bakas | Anne Wagner | Spencer Johnston | Shelia Kennison | Eric Chan-Tin

Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities

JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety

Authors: Najlaa AlMajed | Leandros A. Maglaras | Francois Siewe | Helge Janicke | Pooneh Bagheri Zadeh