Loading…
Searchable symmetric encryption: Improved definitions and efficient constructions
Curtmola, Reza, Garay, Juan, Kamara, Seny, Ostrovsky, Rafail
Published in Journal of computer security (04.11.2011)
Published in Journal of computer security (04.11.2011)
Get full text
Journal Article
Loading…
Automatic analysis of malware behavior using machine learning
Rieck, Konrad, Trinius, Philipp, Willems, Carsten, Holz, Thorsten
Published in Journal of computer security (20.06.2011)
Published in Journal of computer security (20.06.2011)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Adversarial examples for network intrusion detection systems
Sheatsley, Ryan, Papernot, Nicolas, Weisman, Michael J., Verma, Gunjan, McDaniel, Patrick
Published in Journal of computer security (05.10.2022)
Published in Journal of computer security (05.10.2022)
Get full text
Journal Article
Loading…
Data privacy in the Internet of Things based on anonymization: A review
Neves, Flávio, Souza, Rafael, Sousa, Juliana, Bonfim, Michel, Garcia, Vinicius
Published in Journal of computer security (01.01.2023)
Published in Journal of computer security (01.01.2023)
Get full text
Journal Article
Loading…
Loading…
MVDet: Encrypted malware traffic detection via multi-view analysis
Cui, Susu, Han, Xueying, Dong, Cong, Li, Yun, Liu, Song, Lu, Zhigang, Liu, Yuling
Published in Journal of computer security (20.11.2024)
Published in Journal of computer security (20.11.2024)
Get full text
Journal Article
Loading…
Accurate authentication based on ECG using deep learning
Zhang, Liping, Chen, Shukai, Ren, Wei, Min, Geyong, Choo, Kim-Kwang Raymond
Published in Journal of computer security (18.11.2024)
Published in Journal of computer security (18.11.2024)
Get full text
Journal Article
Loading…
Loading…
Loading…
Ensuring cybersecurity for industrial networks: A solution for ARP-based MITM attacks
Bruschi, Danilo, Di Pasquale, Andrea, Lanzi, Andrea, Pagani, Elena
Published in Journal of computer security (18.11.2024)
Published in Journal of computer security (18.11.2024)
Get full text
Journal Article
Loading…
Prioritization and exchange chains in privacy-preserving kidney exchange
Breuer, Malte, Hein, Pascal, Pompe, Leonardo, Meyer, Urike, Wetzel, Susanne
Published in Journal of computer security (26.08.2024)
Published in Journal of computer security (26.08.2024)
Get full text
Journal Article
Loading…
Loading…
DRC-EDI: An integrity protection scheme based on data right confirmation for mobile edge computing
Gao, Yan, Du, Ruizhong, Wang, Xiaofei, Li, Ruilin, Li, Mingyue, Wang, Ziyuan
Published in Journal of computer security (26.08.2024)
Published in Journal of computer security (26.08.2024)
Get full text
Journal Article
Loading…
E-Tenon: An efficient privacy-preserving secure open data sharing scheme for EHR system
Gope, Prosanta, Lin, Zhihui, Yang, Yang, Ning, Jianting
Published in Journal of computer security (26.08.2024)
Published in Journal of computer security (26.08.2024)
Get full text
Journal Article
Loading…
SMET: Semantic mapping of CTI reports and CVE to ATT&CK for advanced threat intelligence
Abdeen, Basel, Al-Shaer, Ehab, Singhal, Anoop, Khan, Latifur, Hamlen, Kevin W.
Published in Journal of computer security (28.06.2024)
Published in Journal of computer security (28.06.2024)
Get full text
Journal Article
Loading…
Cache attacks on subkey calculation of Blowfish
Fan, Haopeng, Wang, Wenhao, Wang, Yongjuan, Wang, Xiangbin, Gao, Yang
Published in Journal of computer security (09.04.2024)
Published in Journal of computer security (09.04.2024)
Get full text
Journal Article