Facet browsing currently unavailable
Page 3 of 128 results
Sort by: relevance publication year
Leveraging attention-based deep neural networks for security vetting of Android applications JOURNAL ARTICLE published 30 November 2021 in ICST Transactions on Security and Safety |
An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process JOURNAL ARTICLE published 4 January 2018 in ICST Transactions on Security and Safety |
Privacy Preserving Collaborative Machine Learning JOURNAL ARTICLE published 10 September 2021 in ICST Transactions on Security and Safety |
How did you know that about me? Protecting users against unwanted inferences JOURNAL ARTICLE published 27 September 2011 in ICST Transactions on Security and Safety |
deMSF: a Method for Detecting Malicious Server Flocks for Same Campaign JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety |
HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware JOURNAL ARTICLE published 8 April 2019 in ICST Transactions on Security and Safety |
Formal Approach to Detect and Resolve Anomalies while Clustering ABAC Policies JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety |
Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service JOURNAL ARTICLE published 29 April 2019 in ICST Transactions on Security and Safety |
Secure Communication in VANET Broadcasting JOURNAL ARTICLE published 10 January 2019 in ICST Transactions on Security and Safety |
Device Authentication Codes based on RF Fingerprinting using Deep Learning JOURNAL ARTICLE published 30 November 2021 in ICST Transactions on Security and Safety |
A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers JOURNAL ARTICLE published 5 August 2022 in ICST Transactions on Security and Safety |
A Multi-connection Encryption Algorithm Applied in Secure Channel Service System JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety |
Cyber situation awareness and teamwork JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety |
CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers JOURNAL ARTICLE published 18 February 2021 in ICST Transactions on Security and Safety |
Defence Mechanisms for Public Systems JOURNAL ARTICLE published 4 January 2018 in ICST Transactions on Security and Safety |
Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications JOURNAL ARTICLE published 30 June 2020 in ICST Transactions on Security and Safety |
Welcome message from the Editor-in-Chief JOURNAL ARTICLE published 27 September 2011 in ICST Transactions on Security and Safety |
Security, Privacy and Trust in Cyber Physical Systems JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety |
A Machine Learning Based Approach for Mobile App Rating Manipulation Detection JOURNAL ARTICLE published 8 April 2019 in ICST Transactions on Security and Safety |
A Rekeying Scheme for Encrypted Deduplication Storage based on NTRU JOURNAL ARTICLE published 12 January 2021 in ICST Transactions on Security and Safety |