Facet browsing currently unavailable
Page 6 of 128 results
Sort by: relevance publication year
Octopus ORAM: An Oblivious RAM with Communication and Server Storage Efficiency JOURNAL ARTICLE published 29 April 2019 in ICST Transactions on Security and Safety |
Re-identification of Vehicular Location-Based Metadata JOURNAL ARTICLE published 7 December 2017 in ICST Transactions on Security and Safety |
Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study JOURNAL ARTICLE published 1 June 2021 in ICST Transactions on Security and Safety |
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach JOURNAL ARTICLE published 10 January 2019 in ICST Transactions on Security and Safety |
Attribution of Economic Denial of Sustainability Attacks in Public Clouds JOURNAL ARTICLE published 4 January 2018 in ICST Transactions on Security and Safety |
Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits JOURNAL ARTICLE published 5 October 2015 in ICST Transactions on Security and Safety |
Exploring the Privacy Bound for Differential Privacy: From Theory to Practice JOURNAL ARTICLE published 8 April 2019 in ICST Transactions on Security and Safety |
Compact lossy and all-but-one trapdoor functions from lattice JOURNAL ARTICLE published 28 December 2017 in ICST Transactions on Security and Safety |
Aggregation for Privately Trained Different Types of Local Models JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety |
Editorial JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety |
Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur JOURNAL ARTICLE published 19 August 2019 in ICST Transactions on Security and Safety |
Identifying forensically uninteresting files in a large corpus JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety |
VaultIME: Regaining User Control for Password Managers through Auto-correction JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety |
BluePass: A Mobile Device Assisted Password Manager JOURNAL ARTICLE published 10 January 2019 in ICST Transactions on Security and Safety |
Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log JOURNAL ARTICLE published 29 April 2019 in ICST Transactions on Security and Safety |
CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized k-d Forest JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety |
Bootstrapping trust in software defined networks JOURNAL ARTICLE published 7 December 2017 in ICST Transactions on Security and Safety |
Mediated Encryption: Analysis and Design JOURNAL ARTICLE published 30 January 2015 in ICST Transactions on Security and Safety |
Malware Detection Based on Opcode Dynamic Analysis JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety |
Analysis of Targeted Mouse Movements for Gender Classification JOURNAL ARTICLE published 7 December 2017 in ICST Transactions on Security and Safety |