Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             78 results found
no title author magazine year volume issue page(s) type
1 Abstracting minimal security-relevant behaviors for malware analysis Cao, Ying
2013
4 p. 193-204
article
2 A Cyber-Kill-Chain based taxonomy of crypto-ransomware features Dargahi, Tooska

4 p. 277-305
article
3 Advanced attribute-based encryption protocol based on the modified secret sharing scheme Kudinov, M. A.

4 p. 333-341
article
4 A hierarchical layer of atomic behavior for malicious behaviors prediction Alaeiyan, Mohammadhadi

4 p. 367-382
article
5 Android botnets for multi-targeted attacks Hamon, Valentin
2014
4 p. 193-202
article
6 Android malware classification using convolutional neural network and LSTM Hosseini, Soodeh

4 p. 307-318
article
7 An effective intrusion detection approach based on ensemble learning for IIoT edge computing Mohy-eddine, Mouaad

4 p. 469-481
article
8 An effective ransomware detection approach in a cloud environment using volatile memory features Prachi,

4 p. 407-424
article
9 An evaluation method for secure virtual network embedding algorithms Kim, Hak Suh
2017
4 p. 265-270
article
10 A novel approach for ransomware detection based on PE header using graph embedding Manavi, Farnoush

4 p. 285-296
article
11 A novel method for malware detection based on hardware events using deep neural networks Ghanei, Hadis

4 p. 319-331
article
12 A performance evaluation of information security training in public sector Park, Sung-Kyu
2017
4 p. 289-296
article
13 A security vulnerability predictor based on source code metrics Pakshad, Puya

4 p. 615-633
article
14 A set of features to detect web security threats Canfora, Gerardo
2016
4 p. 243-261
article
15 A study on common malware families evolution in 2012 Barat, Marius
2013
4 p. 171-178
article
16 A study on the service and trend of Fintech security based on text-mining: focused on the data of Korean online news Li, Guozhong
2017
4 p. 249-255
article
17 Automating NFC message sending for good and evil Brandt, Nikki Benecke
2014
4 p. 273-297
article
18 Behavioral fine-grained detection and classification of P2P bots Kheir, Nizar
2014
4 p. 217-233
article
19 Behavior-based detection and classification of malicious software utilizing structural characteristics of group sequence graphs Nikolopoulos, Stavros D.

4 p. 383-406
article
20 Binary-centric defense of production operating systems against kernel queue injection attacks Wei, Jinpeng

4 p. 259-275
article
21 Black-box forensic and antiforensic characteristics of solid-state drives Bonetti, Gabriele
2014
4 p. 255-271
article
22 BotSpot: fast graph based identification of structured P2P bots Venkatesh, Bharath
2015
4 p. 247-261
article
23 Building a practical and reliable classifier for malware detection Vatamanu, Cristina
2013
4 p. 205-214
article
24 CamDec: Advancing Axis P1435-LE video camera security using honeypot-based deception Sikos, Leslie F.

4 p. 565-577
article
25 ChRelBAC data access control model for large-scale interactive informational-analytical systems Vasenin, Valery

4 p. 313-331
article
26 Clustering versus SVM for malware detection Narra, Usha
2015
4 p. 213-224
article
27 Comparison of the complexity of Diffie–Hellman and discrete logarithm problems Cherepniov, Mikhail

4 p. 265-268
article
28 ConRec: malware classification using convolutional recurrence Mallik, Abhishek

4 p. 297-313
article
29 Context aware based user customized light therapy service using security framework Yoo, Hyun
2017
4 p. 279-288
article
30 Data augmentation and transfer learning to classify malware images in a deep learning context Marastoni, Niccolò

4 p. 279-297
article
31 Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation Soriano-Salvador, Enrique

4 p. 503-513
article
32 Detecting and mitigating DHCP attacks in OpenFlow-based SDN networks: a comprehensive approach Aldaoud, Manar

4 p. 597-614
article
33 Detecting and preventing replay attacks in industrial automation networks operated with profinet IO Pfrang, Steffen
2018
4 p. 253-268
article
34 Detecting privacy leaks in the RATP App: how we proceeded and what we found Achara, Jagdish Prasad
2014
4 p. 229-238
article
35 Detection of suspicious internet traffic based on differential analysis and logical rules Ali Elsiddig, Mohammed

4 p. 347-365
article
36 Editorial Fomichev, Vladimir M.

4 p. 259-260
article
37 Editorial Filiol, Eric

4 p. 257-258
article
38 Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol Adelin, Rémi

4 p. 425-452
article
39 Finding distinguishers for pseudorandom number generators based on permutations Urivskiy, Alexey

4 p. 295-303
article
40 Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits MahdaviOliaee, Mahdi

4 p. 515-528
article
41 Forced continuation of malware execution beyond exceptions Oyama, Yoshihiro

4 p. 483-501
article
42 Function matching between binary executables: efficient algorithms and features Karamitas, Chariton

4 p. 307-323
article
43 Generative adversarial networks and image-based malware classification Nguyen, Huy

4 p. 579-595
article
44 Hacking and convergence computing Rhyu, Sunkyung
2017
4 p. 239-240
article
45 Identifying bot infection using neural networks on DNS traffic Singh, Manmeet

4 p. 549-563
article
46 I know your MAC address: targeted tracking of individual using Wi-Fi Cunche, Mathieu
2013
4 p. 219-227
article
47 Implementation of dataset staging process with improved security in a new analysis facility for ALICE experiment Ahn, Sang Un
2017
4 p. 305-311
article
48 Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques Pham, Duy-Phuc

4 p. 249-257
article
49 Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning Zhou, Zhihong

4 p. 453-463
article
50 Malware detection and classification using community detection and social network analysis Reddy, Varshini

4 p. 333-346
article
51 MinerAlert: an hybrid approach for web mining detection Tommasi, Franco

4 p. 333-346
article
52 Multi-party pairwise key agreement in linear number of Diffie–Hellman key exchanges Shenets, Nikolay

4 p. 275-284
article
53 Not so long, but very rich: a history of Russian crypto standardization Griboedova, Ekaterina

4 p. 261-264
article
54 On normalized compression distance and large malware Borbely, Rebecca Schuller
2015
4 p. 235-242
article
55 On post-handshake authentication and external PSKs in TLS 1.3 Akhmetzyanova, Liliya

4 p. 269-274
article
56 On the practical implementation of Russian protocols for low-resource cryptographic modules Nesterenko, Alexey Yu.

4 p. 305-312
article
57 Performance evaluation of learning models for intrusion detection system using feature selection Kaushik, Baijnath

4 p. 529-548
article
58 PEzoNG: Advanced Packer For Automated Evasion On Windows Bernardinetti, Giorgio

4 p. 315-331
article
59 Provably secure counter mode with related-key-based internal re-keying Alekseev, Evgeny K.

4 p. 285-294
article
60 Research on financial institutional network partition design for anti-hacking Bang, Sang-Won
2017
4 p. 257-263
article
61 Retraction Note: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry Zhang, Liqin

4 p. 639
article
62 Retraction Note: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation Hang, Feilu

4 p. 635
article
63 Retraction Note: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM Rao, Mundlamuri Venkata

4 p. 637
article
64 Reversing the operating system of a Java based smart card Bouffard, Guillaume
2014
4 p. 239-253
article
65 Secure access policy for efficient resource in mobile computing environment Jo, Sun-Moon
2017
4 p. 297-303
article
66 Secure and light IoT protocol (SLIP) for anti-hacking Hong, Sunghyuck
2017
4 p. 241-247
article
67 Secure information authentication protocol between patients and medical staff in a hospital environment Jeong, Yoon-Su
2017
4 p. 271-278
article
68 SEQUIN: a grammar inference framework for analyzing malicious system behavior Luh, Robert
2018
4 p. 291-311
article
69 SherlockDroid: a research assistant to spot unknown malware in Android marketplaces Apvrille, Axelle
2015
4 p. 235-245
article
70 Signature-less ransomware detection and mitigation Joshi, Yash Shashikant

4 p. 299-306
article
71 Singular value decomposition and metamorphic detection Jidigam, Ranjith Kumar
2014
4 p. 203-216
article
72 Special issue on formal methods for security engineering Santone, Antonella
2018
4 p. 251
article
73 Structural entropy and metamorphic malware Baysa, Donabelle
2013
4 p. 179-192
article
74 Subroutine based detection of APT malware Sexton, Joseph
2015
4 p. 225-233
article
75 Support vector machines and malware detection Singh, Tanuvir
2015
4 p. 203-212
article
76 Understanding Linux kernel vulnerabilities Shameli-Sendi, Alireza

4 p. 265-278
article
77 “VANILLA” malware: vanishing antiviruses by interleaving layers and layers of attacks Botacin, Marcus

4 p. 233-247
article
78 Verifying data secure flow in AUTOSAR models Bernardeschi, Cinzia
2018
4 p. 269-289
article
                             78 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands