no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Abstracting minimal security-relevant behaviors for malware analysis
|
Cao, Ying |
|
2013 |
|
4 |
p. 193-204 |
article |
2 |
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features
|
Dargahi, Tooska |
|
|
|
4 |
p. 277-305 |
article |
3 |
Advanced attribute-based encryption protocol based on the modified secret sharing scheme
|
Kudinov, M. A. |
|
|
|
4 |
p. 333-341 |
article |
4 |
A hierarchical layer of atomic behavior for malicious behaviors prediction
|
Alaeiyan, Mohammadhadi |
|
|
|
4 |
p. 367-382 |
article |
5 |
Android botnets for multi-targeted attacks
|
Hamon, Valentin |
|
2014 |
|
4 |
p. 193-202 |
article |
6 |
Android malware classification using convolutional neural network and LSTM
|
Hosseini, Soodeh |
|
|
|
4 |
p. 307-318 |
article |
7 |
An effective intrusion detection approach based on ensemble learning for IIoT edge computing
|
Mohy-eddine, Mouaad |
|
|
|
4 |
p. 469-481 |
article |
8 |
An effective ransomware detection approach in a cloud environment using volatile memory features
|
Prachi, |
|
|
|
4 |
p. 407-424 |
article |
9 |
An evaluation method for secure virtual network embedding algorithms
|
Kim, Hak Suh |
|
2017 |
|
4 |
p. 265-270 |
article |
10 |
A novel approach for ransomware detection based on PE header using graph embedding
|
Manavi, Farnoush |
|
|
|
4 |
p. 285-296 |
article |
11 |
A novel method for malware detection based on hardware events using deep neural networks
|
Ghanei, Hadis |
|
|
|
4 |
p. 319-331 |
article |
12 |
A performance evaluation of information security training in public sector
|
Park, Sung-Kyu |
|
2017 |
|
4 |
p. 289-296 |
article |
13 |
A security vulnerability predictor based on source code metrics
|
Pakshad, Puya |
|
|
|
4 |
p. 615-633 |
article |
14 |
A set of features to detect web security threats
|
Canfora, Gerardo |
|
2016 |
|
4 |
p. 243-261 |
article |
15 |
A study on common malware families evolution in 2012
|
Barat, Marius |
|
2013 |
|
4 |
p. 171-178 |
article |
16 |
A study on the service and trend of Fintech security based on text-mining: focused on the data of Korean online news
|
Li, Guozhong |
|
2017 |
|
4 |
p. 249-255 |
article |
17 |
Automating NFC message sending for good and evil
|
Brandt, Nikki Benecke |
|
2014 |
|
4 |
p. 273-297 |
article |
18 |
Behavioral fine-grained detection and classification of P2P bots
|
Kheir, Nizar |
|
2014 |
|
4 |
p. 217-233 |
article |
19 |
Behavior-based detection and classification of malicious software utilizing structural characteristics of group sequence graphs
|
Nikolopoulos, Stavros D. |
|
|
|
4 |
p. 383-406 |
article |
20 |
Binary-centric defense of production operating systems against kernel queue injection attacks
|
Wei, Jinpeng |
|
|
|
4 |
p. 259-275 |
article |
21 |
Black-box forensic and antiforensic characteristics of solid-state drives
|
Bonetti, Gabriele |
|
2014 |
|
4 |
p. 255-271 |
article |
22 |
BotSpot: fast graph based identification of structured P2P bots
|
Venkatesh, Bharath |
|
2015 |
|
4 |
p. 247-261 |
article |
23 |
Building a practical and reliable classifier for malware detection
|
Vatamanu, Cristina |
|
2013 |
|
4 |
p. 205-214 |
article |
24 |
CamDec: Advancing Axis P1435-LE video camera security using honeypot-based deception
|
Sikos, Leslie F. |
|
|
|
4 |
p. 565-577 |
article |
25 |
ChRelBAC data access control model for large-scale interactive informational-analytical systems
|
Vasenin, Valery |
|
|
|
4 |
p. 313-331 |
article |
26 |
Clustering versus SVM for malware detection
|
Narra, Usha |
|
2015 |
|
4 |
p. 213-224 |
article |
27 |
Comparison of the complexity of Diffie–Hellman and discrete logarithm problems
|
Cherepniov, Mikhail |
|
|
|
4 |
p. 265-268 |
article |
28 |
ConRec: malware classification using convolutional recurrence
|
Mallik, Abhishek |
|
|
|
4 |
p. 297-313 |
article |
29 |
Context aware based user customized light therapy service using security framework
|
Yoo, Hyun |
|
2017 |
|
4 |
p. 279-288 |
article |
30 |
Data augmentation and transfer learning to classify malware images in a deep learning context
|
Marastoni, Niccolò |
|
|
|
4 |
p. 279-297 |
article |
31 |
Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation
|
Soriano-Salvador, Enrique |
|
|
|
4 |
p. 503-513 |
article |
32 |
Detecting and mitigating DHCP attacks in OpenFlow-based SDN networks: a comprehensive approach
|
Aldaoud, Manar |
|
|
|
4 |
p. 597-614 |
article |
33 |
Detecting and preventing replay attacks in industrial automation networks operated with profinet IO
|
Pfrang, Steffen |
|
2018 |
|
4 |
p. 253-268 |
article |
34 |
Detecting privacy leaks in the RATP App: how we proceeded and what we found
|
Achara, Jagdish Prasad |
|
2014 |
|
4 |
p. 229-238 |
article |
35 |
Detection of suspicious internet traffic based on differential analysis and logical rules
|
Ali Elsiddig, Mohammed |
|
|
|
4 |
p. 347-365 |
article |
36 |
Editorial
|
Fomichev, Vladimir M. |
|
|
|
4 |
p. 259-260 |
article |
37 |
Editorial
|
Filiol, Eric |
|
|
|
4 |
p. 257-258 |
article |
38 |
Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol
|
Adelin, Rémi |
|
|
|
4 |
p. 425-452 |
article |
39 |
Finding distinguishers for pseudorandom number generators based on permutations
|
Urivskiy, Alexey |
|
|
|
4 |
p. 295-303 |
article |
40 |
Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits
|
MahdaviOliaee, Mahdi |
|
|
|
4 |
p. 515-528 |
article |
41 |
Forced continuation of malware execution beyond exceptions
|
Oyama, Yoshihiro |
|
|
|
4 |
p. 483-501 |
article |
42 |
Function matching between binary executables: efficient algorithms and features
|
Karamitas, Chariton |
|
|
|
4 |
p. 307-323 |
article |
43 |
Generative adversarial networks and image-based malware classification
|
Nguyen, Huy |
|
|
|
4 |
p. 579-595 |
article |
44 |
Hacking and convergence computing
|
Rhyu, Sunkyung |
|
2017 |
|
4 |
p. 239-240 |
article |
45 |
Identifying bot infection using neural networks on DNS traffic
|
Singh, Manmeet |
|
|
|
4 |
p. 549-563 |
article |
46 |
I know your MAC address: targeted tracking of individual using Wi-Fi
|
Cunche, Mathieu |
|
2013 |
|
4 |
p. 219-227 |
article |
47 |
Implementation of dataset staging process with improved security in a new analysis facility for ALICE experiment
|
Ahn, Sang Un |
|
2017 |
|
4 |
p. 305-311 |
article |
48 |
Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques
|
Pham, Duy-Phuc |
|
|
|
4 |
p. 249-257 |
article |
49 |
Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning
|
Zhou, Zhihong |
|
|
|
4 |
p. 453-463 |
article |
50 |
Malware detection and classification using community detection and social network analysis
|
Reddy, Varshini |
|
|
|
4 |
p. 333-346 |
article |
51 |
MinerAlert: an hybrid approach for web mining detection
|
Tommasi, Franco |
|
|
|
4 |
p. 333-346 |
article |
52 |
Multi-party pairwise key agreement in linear number of Diffie–Hellman key exchanges
|
Shenets, Nikolay |
|
|
|
4 |
p. 275-284 |
article |
53 |
Not so long, but very rich: a history of Russian crypto standardization
|
Griboedova, Ekaterina |
|
|
|
4 |
p. 261-264 |
article |
54 |
On normalized compression distance and large malware
|
Borbely, Rebecca Schuller |
|
2015 |
|
4 |
p. 235-242 |
article |
55 |
On post-handshake authentication and external PSKs in TLS 1.3
|
Akhmetzyanova, Liliya |
|
|
|
4 |
p. 269-274 |
article |
56 |
On the practical implementation of Russian protocols for low-resource cryptographic modules
|
Nesterenko, Alexey Yu. |
|
|
|
4 |
p. 305-312 |
article |
57 |
Performance evaluation of learning models for intrusion detection system using feature selection
|
Kaushik, Baijnath |
|
|
|
4 |
p. 529-548 |
article |
58 |
PEzoNG: Advanced Packer For Automated Evasion On Windows
|
Bernardinetti, Giorgio |
|
|
|
4 |
p. 315-331 |
article |
59 |
Provably secure counter mode with related-key-based internal re-keying
|
Alekseev, Evgeny K. |
|
|
|
4 |
p. 285-294 |
article |
60 |
Research on financial institutional network partition design for anti-hacking
|
Bang, Sang-Won |
|
2017 |
|
4 |
p. 257-263 |
article |
61 |
Retraction Note: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry
|
Zhang, Liqin |
|
|
|
4 |
p. 639 |
article |
62 |
Retraction Note: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation
|
Hang, Feilu |
|
|
|
4 |
p. 635 |
article |
63 |
Retraction Note: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM
|
Rao, Mundlamuri Venkata |
|
|
|
4 |
p. 637 |
article |
64 |
Reversing the operating system of a Java based smart card
|
Bouffard, Guillaume |
|
2014 |
|
4 |
p. 239-253 |
article |
65 |
Secure access policy for efficient resource in mobile computing environment
|
Jo, Sun-Moon |
|
2017 |
|
4 |
p. 297-303 |
article |
66 |
Secure and light IoT protocol (SLIP) for anti-hacking
|
Hong, Sunghyuck |
|
2017 |
|
4 |
p. 241-247 |
article |
67 |
Secure information authentication protocol between patients and medical staff in a hospital environment
|
Jeong, Yoon-Su |
|
2017 |
|
4 |
p. 271-278 |
article |
68 |
SEQUIN: a grammar inference framework for analyzing malicious system behavior
|
Luh, Robert |
|
2018 |
|
4 |
p. 291-311 |
article |
69 |
SherlockDroid: a research assistant to spot unknown malware in Android marketplaces
|
Apvrille, Axelle |
|
2015 |
|
4 |
p. 235-245 |
article |
70 |
Signature-less ransomware detection and mitigation
|
Joshi, Yash Shashikant |
|
|
|
4 |
p. 299-306 |
article |
71 |
Singular value decomposition and metamorphic detection
|
Jidigam, Ranjith Kumar |
|
2014 |
|
4 |
p. 203-216 |
article |
72 |
Special issue on formal methods for security engineering
|
Santone, Antonella |
|
2018 |
|
4 |
p. 251 |
article |
73 |
Structural entropy and metamorphic malware
|
Baysa, Donabelle |
|
2013 |
|
4 |
p. 179-192 |
article |
74 |
Subroutine based detection of APT malware
|
Sexton, Joseph |
|
2015 |
|
4 |
p. 225-233 |
article |
75 |
Support vector machines and malware detection
|
Singh, Tanuvir |
|
2015 |
|
4 |
p. 203-212 |
article |
76 |
Understanding Linux kernel vulnerabilities
|
Shameli-Sendi, Alireza |
|
|
|
4 |
p. 265-278 |
article |
77 |
“VANILLA” malware: vanishing antiviruses by interleaving layers and layers of attacks
|
Botacin, Marcus |
|
|
|
4 |
p. 233-247 |
article |
78 |
Verifying data secure flow in AUTOSAR models
|
Bernardeschi, Cinzia |
|
2018 |
|
4 |
p. 269-289 |
article |