Facet browsing currently unavailable
Page 1 of 128 results
Sort by: relevance publication year
Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits JOURNAL ARTICLE published 5 October 2015 in ICST Transactions on Security and Safety |
Exploring the Privacy Bound for Differential Privacy: From Theory to Practice JOURNAL ARTICLE published 8 April 2019 in ICST Transactions on Security and Safety |
Compact lossy and all-but-one trapdoor functions from lattice JOURNAL ARTICLE published 28 December 2017 in ICST Transactions on Security and Safety |
Aggregation for Privately Trained Different Types of Local Models JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety |
Editorial JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety |
Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur JOURNAL ARTICLE published 19 August 2019 in ICST Transactions on Security and Safety |
Identifying forensically uninteresting files in a large corpus JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety |
VaultIME: Regaining User Control for Password Managers through Auto-correction JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety |
BluePass: A Mobile Device Assisted Password Manager JOURNAL ARTICLE published 10 January 2019 in ICST Transactions on Security and Safety |
Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log JOURNAL ARTICLE published 29 April 2019 in ICST Transactions on Security and Safety |
CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized k-d Forest JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety |
Bootstrapping trust in software defined networks JOURNAL ARTICLE published 7 December 2017 in ICST Transactions on Security and Safety |
Mediated Encryption: Analysis and Design JOURNAL ARTICLE published 30 January 2015 in ICST Transactions on Security and Safety |
Malware Detection Based on Opcode Dynamic Analysis JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety |
Analysis of Targeted Mouse Movements for Gender Classification JOURNAL ARTICLE published 7 December 2017 in ICST Transactions on Security and Safety |
Kernel-Space Intrusion Detection Using Software-Defined Networking JOURNAL ARTICLE published 15 October 2018 in ICST Transactions on Security and Safety |
Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud JOURNAL ARTICLE published 4 January 2018 in ICST Transactions on Security and Safety |
Attacker Capability based Dynamic Deception Model for Large-Scale Networks JOURNAL ARTICLE published 19 August 2019 in ICST Transactions on Security and Safety |
Training organizational supervisors to detect and prevent cyber insider threats: two approaches JOURNAL ARTICLE published 3 May 2013 in ICST Transactions on Security and Safety |
Minor Privacy Protection by Real-time Children Identification and Face Scrambling at the Edge JOURNAL ARTICLE published 30 June 2020 in ICST Transactions on Security and Safety |