Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 128 results
Sort by: relevance publication year

Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits

JOURNAL ARTICLE published 5 October 2015 in ICST Transactions on Security and Safety

Authors: Christopher Kugler | Tilo Müller

Analysis of Targeted Mouse Movements for Gender Classification

JOURNAL ARTICLE published 7 December 2017 in ICST Transactions on Security and Safety

Authors: Nicolas Van Balen | Christopher Ball | Haining Wang

Exploring the Privacy Bound for Differential Privacy: From Theory to Practice

JOURNAL ARTICLE published 8 April 2019 in ICST Transactions on Security and Safety

Authors: Xianmang He | Yuan Hong | Yindong Chen

Compact lossy and all-but-one trapdoor functions from lattice

JOURNAL ARTICLE published 28 December 2017 in ICST Transactions on Security and Safety

Authors: Leixiao Cheng | Quanshui Wu | Yunlei Zhao

Aggregation for Privately Trained Different Types of Local Models

JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety

Authors: Chunling Han | Rui Xue

Editorial

JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety

Authors: David Mohaisen | Sencun Zhu

Identifying forensically uninteresting files in a large corpus

JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety

Authors: N. C. Rowe

VaultIME: Regaining User Control for Password Managers through Auto-correction

JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety

Authors: Le Guan | Sadegh Farhang | Yu Pu | Pinyao Guo | Jens Grossklags | Peng Liu

BluePass: A Mobile Device Assisted Password Manager

JOURNAL ARTICLE published 10 January 2019 in ICST Transactions on Security and Safety

Authors: Yue Li | Haining Wang | Kun Sun

Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud

JOURNAL ARTICLE published 4 January 2018 in ICST Transactions on Security and Safety

Authors: Xiaoyan Sun | Jun Dai | Anoop Singhal | Peng Liu

Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log

JOURNAL ARTICLE published 29 April 2019 in ICST Transactions on Security and Safety

Authors: Anyi Liu | Selena Haidar | Yuan Cheng | Yingjiu Li

CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized k-d Forest

JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety

Authors: Yifan Tian | Jiawei Yuan | Yantian Hou

Bootstrapping trust in software defined networks

JOURNAL ARTICLE published 7 December 2017 in ICST Transactions on Security and Safety

Authors: Nicolae Paladi | Christian Gehrmann

Training organizational supervisors to detect and prevent cyber insider threats: two approaches

JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety

Authors: Dee H. Andrews | Jared Freeman | Terence S. Andre | John Feeney | Alan Carlin | Cali M. Fidopiastis | Patricia Fitzgerald

Kernel-Space Intrusion Detection Using Software-Defined Networking

JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety

Authors: Tommy Chin | Kaiqi Xiong | Mohamed Rahouti

Mediated Encryption: Analysis and Design

JOURNAL ARTICLE published 30 January 2015 in ICST Transactions on Security and Safety

Authors: I. Elashry | Y. Mu | W. Susilo

Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur

JOURNAL ARTICLE published 19 August 2019 in ICST Transactions on Security and Safety

Authors: Yi Li | Kaiqi Xiong | Xiangyang Li

Malware Detection Based on Opcode Dynamic Analysis

JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety

Authors: Jing Zhang | Yu Wen

Minor Privacy Protection by Real-time Children Identification and Face Scrambling at the Edge

JOURNAL ARTICLE published 30 June 2020 in ICST Transactions on Security and Safety

Authors: Alem Fitwi | Meng Yuan | Seyed Nikouei | Yu Chen

Adaptive Noise Injection against Side-Channel Attacks on ARM Platform

JOURNAL ARTICLE published 29 January 2019 in ICST Transactions on Security and Safety

Authors: Naiwei Liu | Wanyu Zang | Songqing Chen | Meng Yu | Ravi Sandhu