Facet browsing currently unavailable
Page 4 of 128 results
Sort by: relevance publication year
Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety |
UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts JOURNAL ARTICLE published 5 October 2015 in ICST Transactions on Security and Safety |
Decision-making and emotions in the contested information environment JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety |
Secure Communication in VANET Broadcasting JOURNAL ARTICLE published 10 January 2019 in ICST Transactions on Security and Safety |
Image encryption algorithm using chaotic maps and cellular automata JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety |
Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety |
Device Authentication Codes based on RF Fingerprinting using Deep Learning JOURNAL ARTICLE published 30 November 2021 in ICST Transactions on Security and Safety |
Cyber situation awareness and teamwork JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety |
User Identity Linkage Method Based on User Online Habit JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety |
Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety |
A secure and lightweight multicast communication system for Smart Grids JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety |
HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware JOURNAL ARTICLE published 8 April 2019 in ICST Transactions on Security and Safety |
Mouse Underlaying: Global Key and Mouse Listener Based on an Almost Invisible Window with Local Listeners and Sophisticated Focus JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety |
Leveraging attention-based deep neural networks for security vetting of Android applications JOURNAL ARTICLE published 30 November 2021 in ICST Transactions on Security and Safety |
An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process JOURNAL ARTICLE published 4 January 2018 in ICST Transactions on Security and Safety |
Privacy Preserving Collaborative Machine Learning JOURNAL ARTICLE published 10 September 2021 in ICST Transactions on Security and Safety |
How did you know that about me? Protecting users against unwanted inferences JOURNAL ARTICLE published 27 September 2011 in ICST Transactions on Security and Safety |
deMSF: a Method for Detecting Malicious Server Flocks for Same Campaign JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety |
CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers JOURNAL ARTICLE published 18 February 2021 in ICST Transactions on Security and Safety |
Formal Approach to Detect and Resolve Anomalies while Clustering ABAC Policies JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety |