Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 4 of 128 results
Sort by: relevance publication year

Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems

JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety

Authors: Adeel Malik | Deepak Tosh

UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts

JOURNAL ARTICLE published 5 October 2015 in ICST Transactions on Security and Safety

Authors: Yazhe Wang | Mingming Mingming Hu | Chen Li

Decision-making and emotions in the contested information environment

JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety

Authors: M.W. Haas | L.M. Hirshfield | P.V. Ponangi | P. Kidambi | D. Rao | N. Edala | E. Armbrust | M. Fendley | S. Narayanan

Secure Communication in VANET Broadcasting

JOURNAL ARTICLE published 10 January 2019 in ICST Transactions on Security and Safety

Authors: Muhammad Jafer | M. Khan | Sabih ur Rehman | Tanveer Zia

Image encryption algorithm using chaotic maps and cellular automata

JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety

Authors: Lanhang Li | Yuling Luo | Shubin Tang | Lvchen Cao | Xue Ouyang

Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge

JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety

Authors: Deeraj Nagothu | Yu Chen | Alexander Aved | Erik Blasch

Device Authentication Codes based on RF Fingerprinting using Deep Learning

JOURNAL ARTICLE published 30 November 2021 in ICST Transactions on Security and Safety

Authors: Joshua Bassey | Xiangfang Li | Lijun Qian

Cyber situation awareness and teamwork

JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety

Authors: Nancy J. Cooke | Michael Champion | Prashanth Rajivan | Shree Jariwala

User Identity Linkage Method Based on User Online Habit

JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety

Authors: Yan Liu

Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase

JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety

Authors: Apala Ray | Johan Akerberg | Mats Bjorkman | Mikael Gidlund

A secure and lightweight multicast communication system for Smart Grids

JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety

Authors: Tiago Rizzetti | BolĂ­var Menezes da Silva | Alexandre Silva Rodrigues | Rafael Gressler Milbradt | Luciane Neves Canha

HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware

JOURNAL ARTICLE published 8 April 2019 in ICST Transactions on Security and Safety

Authors: Chonghua Wang | Libo Yin | Jun Li | Xuehong Chen | Rongchao Yin | Xiaochun Yun | Yang Jiao | Zhiyu Hao

Mouse Underlaying: Global Key and Mouse Listener Based on an Almost Invisible Window with Local Listeners and Sophisticated Focus

JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety

Authors: Tim Witte

Leveraging attention-based deep neural networks for security vetting of Android applications

JOURNAL ARTICLE published 30 November 2021 in ICST Transactions on Security and Safety

Authors: Prabesh Pathak | Prabesh Poudel | Sankardas Roy | Doina Caragea

An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process

JOURNAL ARTICLE published 4 January 2018 in ICST Transactions on Security and Safety

Authors: Chu Huang | Sencun Zhu | Yi Yang

Privacy Preserving Collaborative Machine Learning

JOURNAL ARTICLE published 10 September 2021 in ICST Transactions on Security and Safety

Authors: Zheyuan Liu | Rui Zhang

How did you know that about me? Protecting users against unwanted inferences

JOURNAL ARTICLE published 27 September 2011 in ICST Transactions on Security and Safety

Authors: Sara Motahari | Julia Mayer | Quentin Jones

deMSF: a Method for Detecting Malicious Server Flocks for Same Campaign

JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety

Authors: Yixin Li | Liming Wang | Jing Yang | Zhen Xu | Xi Luo

CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers

JOURNAL ARTICLE published 18 February 2021 in ICST Transactions on Security and Safety

Authors: Wanping Liu | Zhoulan Zhang | Cheng Huang | Yong Fang

Formal Approach to Detect and Resolve Anomalies while Clustering ABAC Policies

JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety

Authors: Maryem Ait El Hadj | Ahmed Khoumsi | Yahya Benkaouz | Mohammed Erradi