Facet browsing currently unavailable
Page 1 of 128 results
Sort by: relevance publication year
An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety |
AMASS: Automated Software Mass Customization via Feature Identification and Tailoring JOURNAL ARTICLE published 29 April 2019 in ICST Transactions on Security and Safety |
Evaluating the Impact of Sandbox Applications on Live Digital Forensics Investigation JOURNAL ARTICLE published 1 June 2021 in ICST Transactions on Security and Safety |
Security of HPC Systems: From a Log-analyzing Perspective JOURNAL ARTICLE published 19 August 2019 in ICST Transactions on Security and Safety |
Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems JOURNAL ARTICLE published 10 September 2021 in ICST Transactions on Security and Safety |
Development of a Multifactor-Security-Protocol System Using Ambient Noise Synthesis JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety |
Differentially Private High-Dimensional Data Publication via Markov Network JOURNAL ARTICLE published 29 January 2019 in ICST Transactions on Security and Safety |
A framework for usable end-user privacy control in social software systems JOURNAL ARTICLE published 27 September 2011 in ICST Transactions on Security and Safety |
FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety |
Overview of Romania 802.11Wireless Security & Statistics JOURNAL ARTICLE published 28 December 2017 in ICST Transactions on Security and Safety |
GIP3: Make Privacy Preserving be Easier on Cloud JOURNAL ARTICLE published 12 January 2021 in ICST Transactions on Security and Safety |
Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety |
Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety |
Monitoring and Improving Managed Security Services inside a Security Operation Center JOURNAL ARTICLE published 8 April 2019 in ICST Transactions on Security and Safety |
Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone JOURNAL ARTICLE published 30 June 2020 in ICST Transactions on Security and Safety |
Binary Code Similarity Detection through LSTM and Siamese Neural Network JOURNAL ARTICLE published 30 November 2021 in ICST Transactions on Security and Safety |
Shoal: A Network Level Moving Target Defense Engine with Software Defined Networking JOURNAL ARTICLE published 1 June 2021 in ICST Transactions on Security and Safety |
Manipulating Users’ Trust on Amazon Echo: Compromising Smart Home from Outside JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety |
Defence Mechanisms for Public Systems JOURNAL ARTICLE published 4 January 2018 in ICST Transactions on Security and Safety |
Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications JOURNAL ARTICLE published 30 June 2020 in ICST Transactions on Security and Safety |