Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 6 of 128 results
Sort by: relevance publication year

Octopus ORAM: An Oblivious RAM with Communication and Server Storage Efficiency

JOURNAL ARTICLE published 29 April 2019 in ICST Transactions on Security and Safety

Authors: Qiumao Ma | Wensheng Zhang

Re-identification of Vehicular Location-Based Metadata

JOURNAL ARTICLE published 7 December 2017 in ICST Transactions on Security and Safety

Authors: Zheng Tan | Cheng Wang | Xiaoling Fu | Jipeng Cui | Changjun Jiang | Weili Han

Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study

JOURNAL ARTICLE published 1 June 2021 in ICST Transactions on Security and Safety

Authors: Van Trieu-Do | Richard Garcia-Lebron | Maochao Xu | Shouhuai Xu | Yusheng Feng

Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach

JOURNAL ARTICLE published 10 January 2019 in ICST Transactions on Security and Safety

Authors: Ivan Homoliak | Martin Teknös | Martín Ochoa | Dominik Breitenbacher | Saeid Hosseini | Petr Hanacek

Attribution of Economic Denial of Sustainability Attacks in Public Clouds

JOURNAL ARTICLE published 4 January 2018 in ICST Transactions on Security and Safety

Authors: Mohammad Karami | An Wang | Songqing Chen

Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits

JOURNAL ARTICLE published 5 October 2015 in ICST Transactions on Security and Safety

Authors: Christopher Kugler | Tilo Müller

Exploring the Privacy Bound for Differential Privacy: From Theory to Practice

JOURNAL ARTICLE published 8 April 2019 in ICST Transactions on Security and Safety

Authors: Xianmang He | Yuan Hong | Yindong Chen

Compact lossy and all-but-one trapdoor functions from lattice

JOURNAL ARTICLE published 28 December 2017 in ICST Transactions on Security and Safety

Authors: Leixiao Cheng | Quanshui Wu | Yunlei Zhao

Aggregation for Privately Trained Different Types of Local Models

JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety

Authors: Chunling Han | Rui Xue

Editorial

JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety

Authors: David Mohaisen | Sencun Zhu

Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur

JOURNAL ARTICLE published 19 August 2019 in ICST Transactions on Security and Safety

Authors: Yi Li | Kaiqi Xiong | Xiangyang Li

Identifying forensically uninteresting files in a large corpus

JOURNAL ARTICLE published 8 December 2016 in ICST Transactions on Security and Safety

Authors: N. C. Rowe

VaultIME: Regaining User Control for Password Managers through Auto-correction

JOURNAL ARTICLE published 15 May 2018 in ICST Transactions on Security and Safety

Authors: Le Guan | Sadegh Farhang | Yu Pu | Pinyao Guo | Jens Grossklags | Peng Liu

BluePass: A Mobile Device Assisted Password Manager

JOURNAL ARTICLE published 10 January 2019 in ICST Transactions on Security and Safety

Authors: Yue Li | Haining Wang | Kun Sun

Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log

JOURNAL ARTICLE published 29 April 2019 in ICST Transactions on Security and Safety

Authors: Anyi Liu | Selena Haidar | Yuan Cheng | Yingjiu Li

CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized k-d Forest

JOURNAL ARTICLE published 18 May 2020 in ICST Transactions on Security and Safety

Authors: Yifan Tian | Jiawei Yuan | Yantian Hou

Bootstrapping trust in software defined networks

JOURNAL ARTICLE published 7 December 2017 in ICST Transactions on Security and Safety

Authors: Nicolae Paladi | Christian Gehrmann

Mediated Encryption: Analysis and Design

JOURNAL ARTICLE published 30 January 2015 in ICST Transactions on Security and Safety

Authors: I. Elashry | Y. Mu | W. Susilo

Malware Detection Based on Opcode Dynamic Analysis

JOURNAL ARTICLE published 30 October 2020 in ICST Transactions on Security and Safety

Authors: Jing Zhang | Yu Wen

Analysis of Targeted Mouse Movements for Gender Classification

JOURNAL ARTICLE published 7 December 2017 in ICST Transactions on Security and Safety

Authors: Nicolas Van Balen | Christopher Ball | Haining Wang