default search action
Cybersecurity, Volume 5
Volume 5, Number 1, December 2022
- Raisa Abedin Disha, Sajjad Waheed:
Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique. 1 - Tanusan Rajmohan, Phu Hong Nguyen, Nicolas Ferry:
A decade of research on patterns and architectures for IoT security. 2 - Yizhe You, Jun Jiang, Zhengwei Jiang, Peian Yang, Baoxu Liu, Huamin Feng, Xuren Wang, Ning Li:
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data. 3 - Pengrui Liu, Xiangrui Xu, Wei Wang:
Threats, attacks and defenses to federated learning: issues, taxonomy and perspectives. 4 - Chuyi Yan, Chen Zhang, Zhigang Lu, Zehui Wang, Yuling Liu, Baoxu Liu:
Blockchain abnormal behavior awareness methods: a survey. 5 - Simon Parkinson, Saad Khan:
Identifying high-risk over-entitlement in access control policies using fuzzy logic. 6 - Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder:
Abstract security patterns and the design of secure systems. 7 - Jian Liu, Junjie Yan, Jun Jiang, Yitong He, Xuren Wang, Zhengwei Jiang, Peian Yang, Ning Li:
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network. 8 - Rui Pinto, Gil Gonçalves, Jerker Delsing, Eduardo Tovar:
Enabling data-driven anomaly detection by design in cyber-physical production systems. 9 - Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao:
Generic, efficient and isochronous Gaussian sampling over the integers. 10 - Fengyu Yang, Yanni Han, Ying Ding, Qian Tan, Zhen Xu:
A flexible approach for cyber threat hunting based on kernel audit records. 11 - Xiaojuan Lu, Bohan Li, Meicheng Liu, Dongdai Lin:
Improved conditional differential attacks on lightweight hash family QUARK. 12 - Lingyun Li, Xianhui Lu, Kunpeng Wang:
Hash-based signature revisited. 13 - Ruishi Li, Yunfei Yang, Jinghua Liu, Peiwei Hu, Guozhu Meng:
The inconsistency of documentation: a study of online C standard library documents. 14 - Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang:
Hybrid dual attack on LWE with arbitrary secrets. 15 - Masoud Mehrabi Koushki, Ibrahim Y. Abualhaol, Anandharaju Durai Raju, Yang Zhou, Ronnie Salvador Giagone, Shengqiang Huang:
On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities. 16 - Ji Shi, Wei Zou, Chao Zhang, Lingxiao Tan, Yanyan Zou, Yue Peng, Wei Huo:
CAMFuzz: Explainable Fuzzing with Local Interpretation. 17 - Max Eisele, Marcello Maugeri, Rachna Shriwas, Christopher Huth, Giampaolo Bella:
Embedded fuzzing: a review of challenges, tools, and solutions. 18 - Zhaoshan Fan, Qing Wang, Haoran Jiao, Junrong Liu, Zelin Cui, Song Liu, Yuling Liu:
PUMD: a PU learning-based malicious domain detection framework. 19 - Yu Zhang, Nanyu Zhong, Wei You, Yanyan Zou, Kunpeng Jian, Jiahuan Xu, Jian Sun, Baoxu Liu, Wei Huo:
NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices. 21 - Anjaneya Awasthi, Noopur Goel:
Phishing website prediction using base and ensemble classifier techniques with cross-validation. 22 - Weiwei Zhang, Zhengzi Xu, Yang Xiao, Yinxing Xue:
Unleashing the power of pseudo-code for binary code similarity analysis. 23 - Feng Wang, Hang Zhou, Han Fang, Weiming Zhang, Nenghai Yu:
Deep 3D mesh watermarking with self-adaptive robustness. 24 - Jenny Heino, Antti Hakkala, Seppo Virtanen:
Study of methods for endpoint aware inspection in a next generation firewall. 25 - Haiyan Xiao, Lifang Wang, Jinyong Chang:
The differential fault analysis on block cipher FeW. 28 - Ruipeng Yang, Aimin Yu, Lijun Cai, Dan Meng:
Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognition. 29 - Zhijian Liao, Qiong Huang, Xinjian Chen:
A fully dynamic forward-secure group signature from lattice. - Vishnu Renganathan, Ekim Yurtsever, Qadeer Ahmed, Aylin Yener:
Valet attack on privacy: a cybersecurity threat in automotive Bluetooth infotainment systems. - Gatha Varma, Ritu Chauhan, Dhananjay Singh:
Sarve: synthetic data and local differential privacy for private frequency estimation. - Kun Jia, Chaoge Liu, Qixu Liu, Junnan Wang, Jiazhi Liu, Feng Liu:
A lightweight DDoS detection scheme under SDN context.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.