The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "Cybersecur."( http://dblp.L3S.de/Venues/Cybersecur. )

URL (DBLP): http://dblp.uni-trier.de/db/journals/cybersec

Publication years (Num. hits)
2018 (16) 2019 (23) 2020 (22) 2021 (38) 2022 (30) 2023 (57) 2024 (13)
Publication types (Num. hits)
article(199)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 199 publication records. Showing 199 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Yanjun Li, Weiguo Zhang, Yiping Lin, Jian Zou, Jian Liu A circuit area optimization of MK-3 S-box. Search on Bibsonomy Cybersecur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Ximing Li 0001, Hao Wang, Sha Ma, Meiyan Xiao, Qiong Huang 0001 Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud. Search on Bibsonomy Cybersecur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Shuang Song, Neng Gao, Yifei Zhang, Cunqing Ma BRITD: behavior rhythm insider threat detection with time awareness and user adaptation. Search on Bibsonomy Cybersecur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Keya Xu, Guang Cheng F3l: an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android. Search on Bibsonomy Cybersecur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Md. Alamgir Hossain, Md. Saiful Islam Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity. Search on Bibsonomy Cybersecur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Alex Shafarenko Winternitz stack protocols for embedded systems and IoT. Search on Bibsonomy Cybersecur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Chenxi Hu, Tao Wu 0011, Chunsheng Liu, Chao Chang Joint contrastive learning and belief rule base for named entity recognition in cybersecurity. Search on Bibsonomy Cybersecur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Linwei Fang, Liming Wang, Hongjia Li Iterative and mixed-spaces image gradient inversion attack in federated learning. Search on Bibsonomy Cybersecur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Fengxia Liu, Zhiyong Zheng, Zixian Gong, Kun Tian, Yi Zhang, Zhe Hu, Jia Li, Qun Xu A survey on lattice-based digital signature. Search on Bibsonomy Cybersecur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Haoran Lyu, Yajie Wang, Yu-An Tan 0001, Huipeng Zhou, Yuhang Zhao, Quanxin Zhang Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks. Search on Bibsonomy Cybersecur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Yanwei Gong, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Jianhua Wang, Haoran Zhu Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods. Search on Bibsonomy Cybersecur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Xi Lin, Heyang Cao, Feng-Hao Liu, Zhedong Wang, Mingsheng Wang Shorter ZK-SNARKs from square span programs over ideal lattices. Search on Bibsonomy Cybersecur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Renyang Liu, Wei Zhou, Xin Jin 0005, Song Gao, Yuanyu Wang, Ruxin Wang 0002 DTA: distribution transform-based attack for query-limited scenario. Search on Bibsonomy Cybersecur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1David Concejal Muñoz, Antonio del Corte-Valiente A novel botnet attack detection for IoT networks based on communication graphs. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jianjun Zhao, Can Yang, Di Wu, Yaqin Cao, Yuling Liu, Xiang Cui, Qixu Liu Detecting compromised email accounts via login behavior characterization. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yi Yang, Ying Li, Kai Chen 0012, Jinghua Liu Jeu de mots paronomasia: a StackOverflow-driven bug discovery approach. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Ziad Hussein, May A. Salama, Sahar A. El-Rahman Evolution of blockchain consensus algorithms: a review on the latest milestones of blockchain consensus algorithms. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jun Cui, Changqi Huang, Huan Meng, Ran Wei Tor network anonymity evaluation based on node anonymity. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Huashuang Yang, Jinqiao Shi, Yue Gao, Xuebin Wang, Yanwei Sun, Ruisheng Shi, Dongbin Wang Evicting and filling attack for linking multiple network addresses of Bitcoin nodes. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Kaisheng Fan, Weizhe Zhang, Guangrui Liu, Hui He FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yatao Yang, Yuying Zhai, Hui Dong, Yanshuo Zhang WAS: improved white-box cryptographic algorithm over AS iteration. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1María-Dolores Cano, Antonio Villafranca, Igor Tasic Performance evaluation of Cuckoo filters as an enhancement tool for password cracking. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jie Yuan 0001, Rui Qian, Tingting Yuan 0001, Mingliang Sun, Jirui Li, Xiaoyong Li 0003 LayerCFL: an efficient federated learning with layer-wised clustering. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Mir Nazish, M. Tariq Banday, Insha Syed, Sheena Banday An efficient permutation approach for SbPN-based symmetric block ciphers. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Anit Kumar Ghosal, Dipanwita Roychowdhury Continuously non-malleable codes from block ciphers in split-state model. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Chao Chen, Fangguo Zhang Verifiable delay functions and delay encryptions from hyperelliptic curves. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Muhammad Usama Sardar, Christof Fetzer Confidential computing and related technologies: a critical review. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yu Wei, Lei Bi 0002, Xianhui Lu, Kunpeng Wang Security estimation of LWE via BKW algorithms. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Zhixiu Guo, Ruigang Liang, Guozhu Meng, Kai Chen 0012 SkillSim: voice apps similarity detection. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Wei-Tao Song, Guang Zeng, Wenzheng Zhang, Dianhua Tang Research on privacy information retrieval model based on hybrid homomorphic encryption. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Qi Zhang, Zhixiang Liang, Shujuan Ji, Benyong Xing, Dickson K. W. Chiu Detecting fake reviewers in heterogeneous networks of buyers and sellers: a collaborative training-based spammer group algorithm. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Vaishnavi Sivagaminathan, Manmohan Sharma, Santosh Kumar Henge Intrusion detection systems for wireless sensor networks using computational intelligence techniques. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Zonghao Ying, Bin Wu 0011 NBA: defensive distillation for backdoor removal via neural behavior alignment. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jiaxi Liu, Yun Feng, Xinyu Liu 0019, Jianjun Zhao, Qixu Liu MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Davide Berardi, Nils Ole Tippenhauer, Andrea Melis 0001, Marco Prandini, Franco Callegati Time sensitive networking security: issues of precision time protocol and its implementation. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yanyan Zou, Wei Zou, JiaCheng Zhao, Nanyu Zhong, Yu Zhang, Ji Shi, Wei Huo PosFuzz: augmenting greybox fuzzing with effective position distribution. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Zonghao Ying, Bin Wu 0011 DLP: towards active defense against backdoor attacks with decoupled learning process. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Xiaobo Xiang, Yue Jiang, Qingli Guo, Xiu Zhang, Xiaorui Gong, Baoxu Liu AppChainer: investigating the chainability among payloads in android applications. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Fei Tang, Shikai Liang, Guowei Ling, Jinyong Shan IHVFL: a privacy-enhanced intention-hiding vertical federated learning framework for medical data. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Hashida Haidros Rahima Manzil, S. Manohar Naik Android malware category detection using a novel feature vector-based machine learning model. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Chaidir Chalaf Islamy, Tohari Ahmad, Royyana Muslim Ijtihadie Reversible data hiding based on histogram and prediction error for sharing secret data. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Rubayyi Alghamdi, Martine Bellaïche An ensemble deep learning based IDS for IoT using Lambda architecture. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Baolong Jin, Rui Xue 0001 Improved lower bound for the complexity of unique shortest vector problem. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Wen Wang, Jianhua Wang, Xiaofeng Peng, Ye Yang, Chun Xiao, Shuai Yang, Mingcai Wang, Lingfei Wang, Lin Li, Xiaolin Chang Exploring best-matched embedding model and classifier for charging-pile fault diagnosis. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yixuan Cheng, Wenqing Fan, Wei Huang, Jingyu Yang, Gaoqing Yu, Wen Liu MSLFuzzer: black-box fuzzing of SOHO router devices via message segment list inference. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Feng Guo, Zheng Sun, Yuxuan Chen, Lei Ju 0001 Towards the transferable audio adversarial attack via ensemble methods. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Chang Liu, Yan-Jun Wu, Jing-Zheng Wu, Chen Zhao A buffer overflow detection and defense method based on RISC-V instruction set extension. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yuting Liu, Yongqiang Li 0001, Huiqin Chen, Mingsheng Wang Full-round impossible differential attack on shadow block cipher. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Sohel Rana, M. Rubaiyat Hossain Mondal, Joarder Kamruzzaman RBFK cipher: a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Sea Ran Cleon Liew, Ngai-Fong Law Use of subword tokenization for domain generation algorithm classification. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yuyao Ge, Zhongguo Yang, Lizhe Chen, Yiming Wang, Chengyang Li Attack based on data: a novel perspective to attack sensitive points directly. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jinglei Pei, Yuyang Shi, Qingling Feng, Ruisheng Shi, Lina Lan, Shui Yu, Jinqiao Shi, Zhaofeng Ma An efficient confidentiality protection solution for pub/sub system. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jiashuo Liu, Jiongjiong Ren, Shaozhen Chen A deep learning aided differential distinguisher improvement framework with more lightweight and universality. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Xia Liu, Huan Yang, Li Yang Minimizing CNOT-count in quantum circuit of the extended Shor's algorithm for ECDLP. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Feng Guo, Zheng Sun, Yuxuan Chen, Lei Ju 0001 Towards the universal defense for query-based audio adversarial attacks on speech recognition system. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Chengbin Jin, Yongbin Zhou Enhancing non-profiled side-channel attacks by time-frequency analysis. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Chuyi Yan, Chen Zhang, Meng Shen, Ning Li, Jinhao Liu, Yinhao Qi, Zhigang Lu 0002, Yuling Liu Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1B. S. Sharmila, Rohini Nagapadma Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yubing Jiang, Peisong Shen, Li Zeng, Xiaojie Zhu, Di Jiang, Chi Chen 0001 Cancelable biometric schemes for Euclidean metric and Cosine metric. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Weihao Huang, Guozhu Meng, Chaoyang Lin, Qiucun Yan, Kai Chen 0012, Zhuo Ma Are our clone detectors good enough? An empirical study of code effects by obfuscation. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Fikirte Ayalke Demmese, Ajaya Neupane, Sajad Khorsandroo, May Wang, Kaushik Roy 0003, Yu Fu Machine learning based fileless malware traffic classification using image visualization. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jean De La Croix Ntivuguruzwa, Tohari Ahmad A convolutional neural network to detect possible hidden data in spatial domain images. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Armita Kazeminajafabadi, Mahdi Imani Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jianfu Huang, Ye Luo, Qinggan Fu, Yincen Chen, Chao Wang, Ling Song 0001 Generic attacks on small-state stream cipher constructions in the multi-user setting. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Hasan Torabi, Seyedeh Leili Mirtaheri, Sergio Greco Practical autoencoder based anomaly detection by using vector reconstruction error. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Haizhou Wang, Anoop Singhal, Peng Liu Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detection. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Vikas Maurya, Rachit Agarwal 0002, Saurabh Kumar 0007, Sandeep K. Shukla EPASAD: ellipsoid decision boundary based Process-Aware Stealthy Attack Detector. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yisroel Mirsky IPatch: a remote adversarial patch. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Zishuai Song, Hui Ma 0002, Shuzhou Sun, Yansen Xin, Rui Zhang 0002 Rainbow: reliable personally identifiable information retrieval across multi-cloud. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Peng Liu 0044, Wenzhe Ye, Haiying Duan, Xianxian Li, Shuyi Zhang, Chuanjian Yao, Yongnan Li Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jian Liu 0008, Junjie Yan, Jun Jiang, Yitong He, Xuren Wang, Zhengwei Jiang, Peian Yang, Ning Li TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Chuyi Yan, Chen Zhang, Zhigang Lu 0002, Zehui Wang, Yuling Liu, Baoxu Liu Blockchain abnormal behavior awareness methods: a survey. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Haiyan Xiao, Lifang Wang, Jinyong Chang The differential fault analysis on block cipher FeW. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Yizhe You, Jun Jiang, Zhengwei Jiang, Peian Yang, Baoxu Liu, Huamin Feng, Xuren Wang, Ning Li TIM: threat context-enhanced TTP intelligence mining on unstructured threat data. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Fengyu Yang, Yanni Han, Ying Ding, Qian Tan, Zhen Xu 0009 A flexible approach for cyber threat hunting based on kernel audit records. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ruipeng Yang, Aimin Yu, Lijun Cai, Dan Meng Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognition. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Xiaojuan Lu, Bohan Li 0004, Meicheng Liu, Dongdai Lin Improved conditional differential attacks on lightweight hash family QUARK. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Lei Bi 0002, Xianhui Lu, Junjie Luo 0001, Kunpeng Wang, Zhenfei Zhang Hybrid dual attack on LWE with arbitrary secrets. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Rui Pinto, Gil Gonçalves 0002, Jerker Delsing, Eduardo Tovar Enabling data-driven anomaly detection by design in cyber-physical production systems. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Raisa Abedin Disha, Sajjad Waheed Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Max Eisele, Marcello Maugeri, Rachna Shriwas, Christopher Huth, Giampaolo Bella Embedded fuzzing: a review of challenges, tools, and solutions. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Gatha Varma, Ritu Chauhan, Dhananjay Singh 0001 Sarve: synthetic data and local differential privacy for private frequency estimation. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ruishi Li, Yunfei Yang, Jinghua Liu, Peiwei Hu, Guozhu Meng The inconsistency of documentation: a study of online C standard library documents. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Joseph W. Yoder Abstract security patterns and the design of secure systems. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Masoud Mehrabi Koushki, Ibrahim Y. Abualhaol, Anandharaju Durai Raju, Yang Zhou, Ronnie Salvador Giagone, Shengqiang Huang On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Lingyun Li, Xianhui Lu, Kunpeng Wang Hash-based signature revisited. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jenny Heino, Antti Hakkala, Seppo Virtanen Study of methods for endpoint aware inspection in a next generation firewall. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Weiwei Zhang, Zhengzi Xu, Yang Xiao, Yinxing Xue Unleashing the power of pseudo-code for binary code similarity analysis. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Pengrui Liu, Xiangrui Xu 0001, Wei Wang 0012 Threats, attacks and defenses to federated learning: issues, taxonomy and perspectives. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Feng Wang, Hang Zhou 0007, Han Fang, Weiming Zhang 0001, Nenghai Yu Deep 3D mesh watermarking with self-adaptive robustness. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Zhijian Liao, Qiong Huang 0001, Xinjian Chen 0004 A fully dynamic forward-secure group signature from lattice. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Yu Zhang, Nanyu Zhong, Wei You, Yanyan Zou, Kunpeng Jian, Jiahuan Xu, Jian Sun, Baoxu Liu, Wei Huo NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Kun Jia, Chaoge Liu, Qixu Liu, Junnan Wang, Jiazhi Liu, Feng Liu A lightweight DDoS detection scheme under SDN context. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ji Shi, Wei Zou, Chao Zhang 0008, Lingxiao Tan, Yanyan Zou, Yue Peng, Wei Huo CAMFuzz: Explainable Fuzzing with Local Interpretation. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Tanusan Rajmohan, Phu Hong Nguyen, Nicolas Ferry 0001 A decade of research on patterns and architectures for IoT security. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang 0002, Yang Tao 0001 Generic, efficient and isochronous Gaussian sampling over the integers. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Zhaoshan Fan, Qing Wang 0041, Haoran Jiao, Junrong Liu, Zelin Cui, Song Liu, Yuling Liu PUMD: a PU learning-based malicious domain detection framework. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Anjaneya Awasthi, Noopur Goel Phishing website prediction using base and ensemble classifier techniques with cross-validation. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Vishnu Renganathan, Ekim Yurtsever, Qadeer Ahmed, Aylin Yener Valet attack on privacy: a cybersecurity threat in automotive Bluetooth infotainment systems. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Simon Parkinson, Saad Khan 0001 Identifying high-risk over-entitlement in access control policies using fuzzy logic. Search on Bibsonomy Cybersecur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 199 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license