no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain
|
Ghorbel, Amal |
|
|
21 |
3 |
p. 489-508 |
article |
2 |
A content-based deep intrusion detection system
|
Soltani, Mahdi |
|
|
21 |
3 |
p. 547-562 |
article |
3 |
Anomalous behavior detection-based approach for authenticating smart home system users
|
Amraoui, Noureddine |
|
|
21 |
3 |
p. 611-636 |
article |
4 |
A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces
|
Zhang, Lu |
|
|
21 |
3 |
p. 509-525 |
article |
5 |
Data space randomization for securing cyber-physical systems
|
Potteiger, Bradley |
|
|
21 |
3 |
p. 597-610 |
article |
6 |
Defeating traffic analysis via differential privacy: a case study on streaming traffic
|
Zhang, Xiaokuan |
|
|
21 |
3 |
p. 689-706 |
article |
7 |
Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture
|
Bhattacharjya, Sairath |
|
|
21 |
3 |
p. 427-436 |
article |
8 |
Evaluating differentially private decision tree model over model inversion attack
|
Park, Cheolhee |
|
|
21 |
3 |
p. 1-14 |
article |
9 |
Gossamer: weaknesses and performance
|
D’Arco, P. |
|
|
21 |
3 |
p. 669-687 |
article |
10 |
Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology
|
Singh, Jaya |
|
|
21 |
3 |
p. 527-546 |
article |
11 |
Maintaining the level of operational effectiveness of a CSOC under adverse conditions
|
Shah, Ankit |
|
|
21 |
3 |
p. 637-651 |
article |
12 |
Narrow privacy and desynchronization in Vaudenay’s RFID model
|
Ţiplea, Ferucio Laurenţiu |
|
|
21 |
3 |
p. 563-575 |
article |
13 |
Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud
|
Alghamdi, Saleh A. |
|
|
21 |
3 |
p. 469-488 |
article |
14 |
Pragmatic authenticated key agreement for IEEE Std 802.15.6
|
Khan, Haibat |
|
|
21 |
3 |
p. 577-595 |
article |
15 |
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures
|
Spence, Aaron |
|
|
21 |
3 |
p. 437-453 |
article |
16 |
Tracking adoption of revocation and cryptographic features in X.509 certificates
|
Zulfiqar, Maryam |
|
|
21 |
3 |
p. 653-668 |
article |