Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 2 of 128 results
Sort by: relevance publication year

Adaptive Noise Injection against Side-Channel Attacks on ARM Platform

JOURNAL ARTICLE published 29 January 2019 in ICST Transactions on Security and Safety

Authors: Naiwei Liu | Wanyu Zang | Songqing Chen | Meng Yu | Ravi Sandhu

Attacker Capability based Dynamic Deception Model for Large-Scale Networks

JOURNAL ARTICLE published 19 August 2019 in ICST Transactions on Security and Safety

Authors: Md Al Amin | Sachin Shetty | Laurent Njilla | Deepak Tosh | Charles Kamouha

Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures

JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety

Authors: Leandros Maglaras | Mohamed Ferrag | Abdelouahid Derhab | Mithun Mukherjee | Helge Janicke | Stylianos Rallis

Towards Automating the Assessment of Software Vulnerability Risk

JOURNAL ARTICLE published 12 January 2021 in ICST Transactions on Security and Safety

Authors: Philip Huff | Qinghua Li

The performance analysis of public key cryptography-based authentication

JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety

Authors: Kaiqi Xiong

Mapping of the Security Requirements of GDPR and NISD

JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety

Authors: Najmudin Saqib | Vasileios Germanos | Wen Zeng | Leandros Maglaras

A study of user experiences and network analysis on anonymity and traceability of bitcoin transactions

JOURNAL ARTICLE published 1 June 2021 in ICST Transactions on Security and Safety

Authors: M Azhar | Robert Whitehead

Privacy-Preserving Multi-Party Directory Services

JOURNAL ARTICLE published 29 January 2019 in ICST Transactions on Security and Safety

Authors: Yuzhe Tang | Kai Li | Katchaguy Areekijseree | Shuigeng Zhou | Liting Hu

Impact of Personality Types and Matching Messaging on Password Strength

JOURNAL ARTICLE published 10 September 2021 in ICST Transactions on Security and Safety

Authors: Anna Bakas | Anne Wagner | Spencer Johnston | Shelia Kennison | Eric Chan-Tin

Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities

JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety

Authors: Najlaa AlMajed | Leandros A. Maglaras | Francois Siewe | Helge Janicke | Pooneh Bagheri Zadeh

Introduction to special issue on information privacy and trust in social media

JOURNAL ARTICLE published 27 September 2011 in ICST Transactions on Security and Safety

Authors: Heng Xu | Chuan-Hoo Tan

Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems

JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety

Authors: Adeel Malik | Deepak Tosh

UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts

JOURNAL ARTICLE published 5 October 2015 in ICST Transactions on Security and Safety

Authors: Yazhe Wang | Mingming Mingming Hu | Chen Li

Decision-making and emotions in the contested information environment

JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety

Authors: M.W. Haas | L.M. Hirshfield | P.V. Ponangi | P. Kidambi | D. Rao | N. Edala | E. Armbrust | M. Fendley | S. Narayanan

Image encryption algorithm using chaotic maps and cellular automata

JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety

Authors: Lanhang Li | Yuling Luo | Shubin Tang | Lvchen Cao | Xue Ouyang

Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge

JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety

Authors: Deeraj Nagothu | Yu Chen | Alexander Aved | Erik Blasch

User Identity Linkage Method Based on User Online Habit

JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety

Authors: Yan Liu

Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase

JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety

Authors: Apala Ray | Johan Akerberg | Mats Bjorkman | Mikael Gidlund

A secure and lightweight multicast communication system for Smart Grids

JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety

Authors: Tiago Rizzetti | BolĂ­var Menezes da Silva | Alexandre Silva Rodrigues | Rafael Gressler Milbradt | Luciane Neves Canha

Mouse Underlaying: Global Key and Mouse Listener Based on an Almost Invisible Window with Local Listeners and Sophisticated Focus

JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety

Authors: Tim Witte