Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 2 of 128 results
Sort by: relevance publication year

Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures

JOURNAL ARTICLE published 11 December 2018 in ICST Transactions on Security and Safety

Authors: Leandros Maglaras | Mohamed Ferrag | Abdelouahid Derhab | Mithun Mukherjee | Helge Janicke | Stylianos Rallis

Minor Privacy Protection by Real-time Children Identification and Face Scrambling at the Edge

JOURNAL ARTICLE published 30 June 2020 in ICST Transactions on Security and Safety

Authors: Alem Fitwi | Meng Yuan | Seyed Nikouei | Yu Chen

Adaptive Noise Injection against Side-Channel Attacks on ARM Platform

JOURNAL ARTICLE published 29 January 2019 in ICST Transactions on Security and Safety

Authors: Naiwei Liu | Wanyu Zang | Songqing Chen | Meng Yu | Ravi Sandhu

Towards Automating the Assessment of Software Vulnerability Risk

JOURNAL ARTICLE published 12 January 2021 in ICST Transactions on Security and Safety

Authors: Philip Huff | Qinghua Li

The performance analysis of public key cryptography-based authentication

JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety

Authors: Kaiqi Xiong

Mapping of the Security Requirements of GDPR and NISD

JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety

Authors: Najmudin Saqib | Vasileios Germanos | Wen Zeng | Leandros Maglaras

A study of user experiences and network analysis on anonymity and traceability of bitcoin transactions

JOURNAL ARTICLE published 1 June 2021 in ICST Transactions on Security and Safety

Authors: M Azhar | Robert Whitehead

Privacy-Preserving Multi-Party Directory Services

JOURNAL ARTICLE published 29 January 2019 in ICST Transactions on Security and Safety

Authors: Yuzhe Tang | Kai Li | Katchaguy Areekijseree | Shuigeng Zhou | Liting Hu

Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities

JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety

Authors: Najlaa AlMajed | Leandros A. Maglaras | Francois Siewe | Helge Janicke | Pooneh Bagheri Zadeh

Introduction to special issue on information privacy and trust in social media

JOURNAL ARTICLE published 27 September 2011 in ICST Transactions on Security and Safety

Authors: Heng Xu | Chuan-Hoo Tan

Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems

JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety

Authors: Adeel Malik | Deepak Tosh

UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts

JOURNAL ARTICLE published 5 October 2015 in ICST Transactions on Security and Safety

Authors: Yazhe Wang | Mingming Mingming Hu | Chen Li

Decision-making and emotions in the contested information environment

JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety

Authors: M.W. Haas | L.M. Hirshfield | P.V. Ponangi | P. Kidambi | D. Rao | N. Edala | E. Armbrust | M. Fendley | S. Narayanan

Secure Communication in VANET Broadcasting

JOURNAL ARTICLE published 10 January 2019 in ICST Transactions on Security and Safety

Authors: Muhammad Jafer | M. Khan | Sabih ur Rehman | Tanveer Zia

Image encryption algorithm using chaotic maps and cellular automata

JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety

Authors: Lanhang Li | Yuling Luo | Shubin Tang | Lvchen Cao | Xue Ouyang

Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge

JOURNAL ARTICLE published 13 July 2018 in ICST Transactions on Security and Safety

Authors: Deeraj Nagothu | Yu Chen | Alexander Aved | Erik Blasch

Device Authentication Codes based on RF Fingerprinting using Deep Learning

JOURNAL ARTICLE published 30 November 2021 in ICST Transactions on Security and Safety

Authors: Joshua Bassey | Xiangfang Li | Lijun Qian

Cyber situation awareness and teamwork

JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety

Authors: Nancy J. Cooke | Michael Champion | Prashanth Rajivan | Shree Jariwala

User Identity Linkage Method Based on User Online Habit

JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety

Authors: Yan Liu

Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase

JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety

Authors: Apala Ray | Johan Akerberg | Mats Bjorkman | Mikael Gidlund