Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 3 of 128 results
Sort by: relevance publication year

Leveraging attention-based deep neural networks for security vetting of Android applications

JOURNAL ARTICLE published 30 November 2021 in ICST Transactions on Security and Safety

Authors: Prabesh Pathak | Prabesh Poudel | Sankardas Roy | Doina Caragea

An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process

JOURNAL ARTICLE published 4 January 2018 in ICST Transactions on Security and Safety

Authors: Chu Huang | Sencun Zhu | Yi Yang

Privacy Preserving Collaborative Machine Learning

JOURNAL ARTICLE published 10 September 2021 in ICST Transactions on Security and Safety

Authors: Zheyuan Liu | Rui Zhang

How did you know that about me? Protecting users against unwanted inferences

JOURNAL ARTICLE published 27 September 2011 in ICST Transactions on Security and Safety

Authors: Sara Motahari | Julia Mayer | Quentin Jones

deMSF: a Method for Detecting Malicious Server Flocks for Same Campaign

JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety

Authors: Yixin Li | Liming Wang | Jing Yang | Zhen Xu | Xi Luo

HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware

JOURNAL ARTICLE published 8 April 2019 in ICST Transactions on Security and Safety

Authors: Chonghua Wang | Libo Yin | Jun Li | Xuehong Chen | Rongchao Yin | Xiaochun Yun | Yang Jiao | Zhiyu Hao

Formal Approach to Detect and Resolve Anomalies while Clustering ABAC Policies

JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety

Authors: Maryem Ait El Hadj | Ahmed Khoumsi | Yahya Benkaouz | Mohammed Erradi

Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service

JOURNAL ARTICLE published 29 April 2019 in ICST Transactions on Security and Safety

Authors: Vinay Sachidananda | Suhas Bhairav | Yuval Elovici

Secure Communication in VANET Broadcasting

JOURNAL ARTICLE published 10 January 2019 in ICST Transactions on Security and Safety

Authors: Muhammad Jafer | M. Khan | Sabih ur Rehman | Tanveer Zia

Device Authentication Codes based on RF Fingerprinting using Deep Learning

JOURNAL ARTICLE published 30 November 2021 in ICST Transactions on Security and Safety

Authors: Joshua Bassey | Xiangfang Li | Lijun Qian

A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers

JOURNAL ARTICLE published 5 August 2022 in ICST Transactions on Security and Safety

Authors: Muhammad Shoaib Akhtar | Tao Feng

A Multi-connection Encryption Algorithm Applied in Secure Channel Service System

JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety

Authors: Fanhao Meng | Rongheng Lin | Zhuoran Wang | Hua Zou | Shiqi Zhou

Cyber situation awareness and teamwork

JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety

Authors: Nancy J. Cooke | Michael Champion | Prashanth Rajivan | Shree Jariwala

CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers

JOURNAL ARTICLE published 18 February 2021 in ICST Transactions on Security and Safety

Authors: Wanping Liu | Zhoulan Zhang | Cheng Huang | Yong Fang

Defence Mechanisms for Public Systems

JOURNAL ARTICLE published 4 January 2018 in ICST Transactions on Security and Safety

Authors: Sencun Zhu | Kevin Jones | Leandros Maglaras

Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications

JOURNAL ARTICLE published 30 June 2020 in ICST Transactions on Security and Safety

Authors: Soohyun Park | Yeongeun Kang | Jeman Park | Joongheon Kim

Welcome message from the Editor-in-Chief

JOURNAL ARTICLE published 27 September 2011 in ICST Transactions on Security and Safety

Authors: Peng Liu

Security, Privacy and Trust in Cyber Physical Systems

JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety

Authors: H. Janicke | Kevin Jones | L. Maglaras

A Machine Learning Based Approach for Mobile App Rating Manipulation Detection

JOURNAL ARTICLE published 8 April 2019 in ICST Transactions on Security and Safety

Authors: Yang Song | Chen Wu | Sencun Zhu | Haining Wang

A Rekeying Scheme for Encrypted Deduplication Storage based on NTRU

JOURNAL ARTICLE published 12 January 2021 in ICST Transactions on Security and Safety

Authors: GuanXiong Ha | Hang Chen | Ruiqi Li | Wei Shao | Chunfu Jia