Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             15 results found
no title author magazine year volume issue page(s) type
1 A novel malicious remote administration tool using stealth and self-defense techniques Kazoleas, Ioannis

21 2 p. 357-378
article
2 An SSH predictive model using machine learning with web proxy session logs Lee, Junwon

21 2 p. 311-322
article
3 Applying NLP techniques to malware detection in a practical environment Mimura, Mamoru

21 2 p. 279-291
article
4 A semantic-aware log generation method for network activities Yichiet, Aun

21 2 p. 161-177
article
5 Authenticated logarithmic-order supersingular isogeny group key exchange Hougaard, Hector B.

21 2 p. 207-221
article
6 Automated benchmark network diversification for realistic attack simulation with application to moving target defense Bajic, Alexander

21 2 p. 253-278
article
7 Browser-in-the-Middle (BitM) attack Tommasi, Franco

21 2 p. 179-189
article
8 Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system Ahmad, Tahir

21 2 p. 379-408
article
9 ISM-AC: an immune security model based on alert correlation and software-defined networking Melo, Roberto Vasconcelos

21 2 p. 191-205
article
10 Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow Munonye, Kindson

21 2 p. 223-237
article
11 Mitigating insider threat by profiling users based on mouse usage pattern: ensemble learning and frequency domain analysis Yildirim, Metehan

21 2 p. 239-251
article
12 Optimization of parallel firewalls filtering rules Hadjadj, Taha Elamine

21 2 p. 323-340
article
13 Password guessers under a microscope: an in-depth analysis to inform deployments Parish, Zach

21 2 p. 409-425
article
14 The Agent Web Model: modeling web hacking for reinforcement learning Erdődi, László

21 2 p. 293-309
article
15 Topology-hiding garbled circuits without universal circuits Zhang, Zheng

21 2 p. 341-356
article
                             15 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands