default search action
Cybersecurity, Volume 4
Volume 4, Number 1, December 2021
- Raphael Anaadumba, Qi Liu, Bockarie Daniel Marah, Francis Mawuli Nakoty, Xiaodong Liu, Yonghong Zhang:
A renewable energy forecasting and control approach to secured edge-level efficiency in a distributed micro-grid. 1 - Wenbo Liu, Qiong Huang, Xinjian Chen, Hongbo Li:
Efficient functional encryption for inner product with simulation-based security. 2 - Runchen Gao, Shen Li, Yuqi Gao, Rui Guo:
A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving. 3 - Alex Shafarenko:
A PLS blockchain for IoT applications: protocols and architecture. 4 - Ruigang Liang, Ying Cao, Peiwei Hu, Kai Chen:
Neutron: an attention-based neural decompiler. 5 - Venkata Reddy Palleti, Sridhar Adepu, Vishrut Kumar Mishra, Aditya Mathur:
Cascading effects of cyber-attacks on interconnected critical infrastructure. 8 - Md. Shafiur Rahman, Sajal Halder, Md. Ashraf Uddin, Uzzal Kumar Acharjee:
An efficient hybrid system for anomaly detection in social networks. 10 - Shafi Ullah, Raja Zahilah Raja Mohd Radzi:
Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices. 11 - Ansam Khraisat, Ammar Alazab:
A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. 18 - Cheah Huei Yoong, Venkata Reddy Palleti, Rajib Ranjan Maiti, Arlindo Silva, Christopher M. Poskitt:
Deriving invariant checkers for critical infrastructure using axiomatic design principles. 6 - Jianguo Jiang, Baole Wei, Min Yu, Gang Li, Boquan Li, Chao Liu, Min Li, Weiqing Huang:
An end-to-end text spotter with text relation networks. 7 - Waleed Alghamdi, Michael Schukat:
Precision time protocol attack strategies and their resistance to existing security extensions. 12 - Chun Yang, Jinghui Xu, Shuangshuang Liang, Yanna Wu, Yu Wen, Boyang Zhang, Dan Meng:
DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection. 16 - Jingdian Ming, Yongbin Zhou, Huizhong Li, Qian Zhang:
A secure and highly efficient first-order masking scheme for AES linear operations. 14 - Xuzi Wang, Baofeng Wu, Lin Hou, Dongdai Lin:
Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers. 17 - Roee Leon, Michael Kiperberg, Anat Anatey Leon Zabag, Nezer Jacob Zaidenberg:
Hypervisor-assisted dynamic malware analysis. 19 - Yuhang Zhao, Ruigang Liang, Xiang Chen, Jing Zou:
Evaluation indicators for open-source software: a review. 20 - Gu Ban, Lili Xu, Yang Xiao, Xinhua Li, Zimu Yuan, Wei Huo:
B2SMatcher: fine-Grained version identification of open-Source software in binary files. 21 - Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Longquan Liu, Yanyan Zou, Chao Zhang, Baoxu Liu:
ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities. 24 - Jonah Burgess, Philip O'Kane, Sakir Sezer, Domhnall Carlin:
LSTM RNN: detecting exploit kits using redirection chain sequences. 25 - Hui Liu, Li Yang:
Quantum key recovery attack on SIMON32/64. 23 - M. R. Gauthama Raman, Chuadhry Mujeeb Ahmed, Aditya Mathur:
Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation. 27 - Pei-Yi Lin, Chia-Wei Tien, Ting-Chun Huang, Chin-Wei Tien:
ICPFuzzer: proprietary communication protocol fuzzing by using machine learning and feedback strategies. 28 - Zuoguang Wang, Hongsong Zhu, Peipei Liu, Limin Sun:
Social engineering in cybersecurity: a domain ontology and knowledge graph application examples. 31 - Sabarathinam Chockalingam, Wolter Pieters, André Teixeira, Pieter H. A. J. M. van Gelder:
Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates. 29 - Sagar Sharma, Keke Chen:
Confidential machine learning on untrusted platforms: a survey. 30 - Wenqin Cao, Wentao Zhang:
Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers. 32 - Zhilong Wang, Peng Liu:
Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity. 33 - Junpeng Xu, Haixia Chen, Xu Yang, Wei Wu, Yongcheng Song:
Verifiable image revision from chameleon hashes. 34 - Huizhong Li, Guang Yang, Jingdian Ming, Yongbin Zhou, Chengbin Jin:
Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes. 35 - Alex Shafarenko:
Indexing structures for the PLS blockchain. 36 - Bingyu Liu, Shangyu Xie, Yuanzhou Yang, Rujia Wang, Yuan Hong:
Privacy preserving divisible double auction with a hybridized TEE-blockchain system. 37 - Jianhua Wang, Xiaolin Chang, Yixiang Wang, Ricardo J. Rodríguez, Jianan Zhang:
LSGAN-AT: enhancing malware detector robustness against adversarial examples. 38 - Chen Gao, Xuan Zhang, Hui Liu:
Data and knowledge-driven named entity recognition for cyber security. - Lulu Yang, Chen Li, Ruibang You, Bibo Tu, Linghui Li:
TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings. - Shushan Arakelyan, Sima Arasteh, Christophe Hauser, Erik Kline, Aram Galstyan:
Bin2vec: learning representations of binary executable programs for security tasks. - Yiru Sun, Yanyan Liu:
An efficient fully dynamic group signature with message dependent opening from lattice. - Xiang Yin, Yanni Han, Zhen Xu, Jie Liu:
VAECGAN: a generating framework for long-term prediction in multivariate time series.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.