Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             84 results found
no title author magazine year volume issue page(s) type
1 A comprehensive review of the security flaws of hashing algorithms Sadeghi-Nasab, Alireza

2 p. 287-302
article
2 Adjusting context-aware RFID in health screening center Choi, Young Jin
2014
2 p. 115-118
article
3 A generalized framework for accelerating exhaustive search utilizing deterministic related-key differential characteristics Soleimany, Hadi

2 p. 141-146
article
4 A loop splitting method for single loops with non-uniform dependences Jeong, Sam Jin
2014
2 p. 137-143
article
5 A low complexity image stitching using advanced feature matching in mobile environments Ahn, Hyochang
2014
2 p. 129-136
article
6 A new Shamir’s three pass random matrix ciphering mechanism Dupont, François

2 p. 237-248
article
7 An indoor location tracking based on mobile RFID for smart exhibition service Kim, So Hyeon
2014
2 p. 89-96
article
8 Anomaly detection in business processes logs using social network analysis Ebrahim, Mina

2 p. 127-139
article
9 Anti-emulation trends in modern packers: a survey on the evolution of anti-emulation techniques in UPA packers Liţă, Cătălin Valeriu
2017
2 p. 107-126
article
10 Application of the SAMA methodology to Ryuk malware Masid, Ander Granado

2 p. 165-198
article
11 A study on scalable information matching system based on web service information Sim, Sung-Ho
2014
2 p. 81-88
article
12 A study on the factors that affect the adoption of Smart Water Grid Kim, Dong-hwan
2014
2 p. 119-128
article
13 A study on the service quality of SMEs management consulting affecting the perceived management performance in mobile communication environments Choi, Myoung-Kyu
2014
2 p. 145-156
article
14 Attacks on the simple substitution cipher with the calculation of their reliability Babash, A. V.

2 p. 213-218
article
15 Audio signal processing for Android malware detection and family identification Mercaldo, Francesco

2 p. 139-152
article
16 Automated generation of colluding apps for experimental research Blasco, Jorge
2017
2 p. 127-138
article
17 Behavior-based features model for malware detection Galal, Hisham Shehata
2015
2 p. 59-67
article
18 Buffer overflow vulnerabilities in CUDA: a preliminary analysis Miele, Andrea
2015
2 p. 113-120
article
19 Choquet integral-based product satisfaction inference in consideration of subjective decision-making tendencies Kwon, Il-Kyoung
2014
2 p. 71-80
article
20 Chronicle of a Java Card death Farhadi, Mozhdeh
2016
2 p. 109-123
article
21 Clustering for malware classification Pai, Swathi
2016
2 p. 95-107
article
22 Correction to: Potential cyber threats of adversarial attacks on autonomous driving models Boltachev, Eldar

2 p. 315
article
23 Covert timing channels: analyzing WEB traffic Nasseralfoghara, Mehrdad

2 p. 117-126
article
24 Cross-VM cache attacks on Camellia Seddigh, Milad

2 p. 91-99
article
25 Cryptographic protocol conformance testing based on domain-specific state machine Prokopev, Sergey

2 p. 249-259
article
26 DBI, debuggers, VM: gotta catch them all Plumerault, François

2 p. 105-117
article
27 Deep learning for image-based mobile malware detection Mercaldo, Francesco

2 p. 157-171
article
28 Demonstration of new attacks on three healthcare network protocols in a lab environment Dupont, Guillaume

2 p. 301-314
article
29 Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware Yonamine, Shun

2 p. 149-163
article
30 DHCP attacking tools: an analysis Aldaoud, Manar

2 p. 119-129
article
31 Dueling hidden Markov models for virus analysis Kalbhor, Ashwin
2014
2 p. 103-118
article
32 Editorial Sadeghiyan, Babak

2 p. 69-70
article
33 Enhanced DNNs for malware classification with GAN-based adversarial training Zhang, Yunchun

2 p. 153-163
article
34 Erratum to: Evolution and characterization of point-of-sale RAM scraping malware Rodríguez, Ricardo J.
2016
2 p. 139
article
35 Explainable Ransomware Detection with Deep Learning Techniques Ciaramella, Giovanni

2 p. 317-330
article
36 Exploiting flaws in Windbg: how to escape or fool debuggers from existing flaws Plumerault, François

2 p. 173-183
article
37 Extremely scalable storage and clustering of malware metadata Asquith, Matthew
2015
2 p. 49-58
article
38 Full round impossible differentials for Feistel ciphers Zakharov, D.

2 p. 295-300
article
39 HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection Eskandari, Mojtaba
2013
2 p. 77-93
article
40 Heuristic estimation of network capacity and spectrum requirement Kim, Taehan
2014
2 p. 97-100
article
41 Hidden Markov models for malware classification Annachhatre, Chinmayee
2014
2 p. 59-73
article
42 Hidden Markov models with random restarts versus boosting for malware detection Raghavan, Aditya
2018
2 p. 97-107
article
43 Hiding a fault enabled virus through code construction Hamadouche, Samiya

2 p. 103-124
article
44 Historical notes on Russian cryptography Epishkina, Anna

2 p. 277-293
article
45 Hunting for metamorphic JavaScript malware Musale, Mangesh
2014
2 p. 89-102
article
46 Identification of malicious android app using manifest and opcode features Varsha, M. V.
2016
2 p. 125-138
article
47 IFMD: image fusion for malware detection Hashemi, Hashem

2 p. 271-286
article
48 Implementation of a web-based smart electronic needle system Kim, Man Ki
2014
2 p. 101-108
article
49 Improving binary diffing speed and accuracy using community detection and locality-sensitive hashing: an empirical study Karamitas, Chariton

2 p. 319-337
article
50 Legal limits of search and seizure for digital forensic in Korea Kim, Sang Gyun
2014
2 p. 157-163
article
51 Leveraging branch traces to understand kernel internals from within Botacin, Marcus

2 p. 141-155
article
52 Lightweight versus obfuscation-resilient malware detection in android applications Aghamohammadi, Ali

2 p. 125-139
article
53 Malicious URI resolving in PDF documents Hamon, Valentin
2013
2 p. 65-76
article
54 Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types Eder-Neuhauser, Peter
2018
2 p. 109-125
article
55 Markhor: malware detection using fuzzy similarity of system call dependency sequences Lajevardi, Amir Mohammadzade

2 p. 81-90
article
56 Metamorphic worm that carries its own morphing engine Madenur Sridhara, Sudarshan
2012
2 p. 49-58
article
57 MGM beyond the birthday bound Kurochkin, Alexey

2 p. 231-235
article
58 Modeling discovery and removal of security vulnerabilities in software system using priority queueing models Lim, Dae-Eun
2014
2 p. 109-114
article
59 Multi-context features for detecting malicious programs Saleh, Moustafa
2017
2 p. 181-193
article
60 Music classification as a new approach for malware detection Farrokhmanesh, Mehrdad
2018
2 p. 77-96
article
61 Network malware classification comparison using DPI and flow packet headers Boukhtouta, Amine
2015
2 p. 69-100
article
62 On delegatability of MDVS schemes Rastegari, Parvin

2 p. 71-80
article
63 Packer identification using Byte plot and Markov plot Kancherla, Kesav
2015
2 p. 101-111
article
64 Picker Blinder: a framework for automatic injection of malicious inter-app communication Casolare, Rosangela

2 p. 331-346
article
65 Pure-Call Oriented Programming (PCOP): chaining the gadgets using call instructions Sadeghi, AliAkbar
2017
2 p. 139-156
article
66 Recent trends in Mobile Communication Systems Oh, Sang-Yeob
2014
2 p. 67-70
article
67 Recognition of tor malware and onion services Bergman, Jesper

2 p. 261-275
article
68 RETRACTED ARTICLE: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry Zhang, Liqin

2 p. 199-215
article
69 RETRACTED ARTICLE: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation Hang, Feilu

2 p. 257-269
article
70 RETRACTED ARTICLE: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM Venkata Rao, Mundlamuri

2 p. 241-255
article
71 Sliding window and control flow weight for metamorphic malware detection Alam, Shahid
2014
2 p. 75-88
article
72 Structural analysis of binary executable headers for malware detection optimization David, Baptiste
2016
2 p. 87-93
article
73 Study on a security intelligence trading platform based on blockchain and IPFS Xu, Hejun

2 p. 131-137
article
74 Superfetch: the famous unknown spy Venault, Mathilde

2 p. 91-104
article
75 Systematization of knowledge: privacy methods and zero knowledge proofs in corporate blockchains Konkin, Anatoly

2 p. 219-224
article
76 Testing closed source software: computer forensic tool case study Talib, Manar Abu
2017
2 p. 167-179
article
77 The security of databases: the Access case David, Baptiste
2013
2 p. 95-107
article
78 The threat of forcing the identical roles for authenticated key establishment protocols Alekseev, Evgeny

2 p. 225-230
article
79 Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks Ghahramani, Meysam

2 p. 303-317
article
80 Uforia: Universal forensic indexer and analyzer Eijkhoudt, Arnim
2013
2 p. 59-63
article
81 Vigenère scores for malware detection Deshmukh, Suchita
2017
2 p. 157-165
article
82 Windows malware detection system based on LSVC recommended hybrid features Shiva Darshan, S. L.
2018
2 p. 127-146
article
83 XAI for intrusion detection system: comparing explanations based on global and local scope Hariharan, Swetha

2 p. 217-239
article
84 Zipf’s law analysis on the leaked Iranian users’ passwords Alebouyeh, Zeinab

2 p. 101-116
article
                             84 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands