The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "Cybersecur."( http://dblp.L3S.de/Venues/Cybersecur. )

URL (DBLP): http://dblp.uni-trier.de/db/journals/cybersec

Publication years (Num. hits)
2018 (16) 2019 (23) 2020 (22) 2021 (38) 2022 (30) 2023 (57) 2024 (13)
Publication types (Num. hits)
article(199)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 199 publication records. Showing 199 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Wenbo Liu, Qiong Huang 0001, Xinjian Chen 0004, Hongbo Li 0004 Efficient functional encryption for inner product with simulation-based security. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Cheah Huei Yoong, Venkata Reddy Palleti, Rajib Ranjan Maiti, Arlindo Silva, Christopher M. Poskitt Deriving invariant checkers for critical infrastructure using axiomatic design principles. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Bingyu Liu, Shangyu Xie, Yuanzhou Yang, Rujia Wang, Yuan Hong Privacy preserving divisible double auction with a hybridized TEE-blockchain system. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sabarathinam Chockalingam, Wolter Pieters, André Teixeira 0001, Pieter H. A. J. M. van Gelder Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jianguo Jiang, Baole Wei, Min Yu 0001, Gang Li 0009, Boquan Li 0002, Chao Liu 0020, Min Li, Weiqing Huang An end-to-end text spotter with text relation networks. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Raphael Anaadumba, Qi Liu 0001, Bockarie Daniel Marah, Francis Mawuli Nakoty, Xiaodong Liu 0002, Yonghong Zhang A renewable energy forecasting and control approach to secured edge-level efficiency in a distributed micro-grid. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jingdian Ming, Yongbin Zhou, Huizhong Li, Qian Zhang 0042 A secure and highly efficient first-order masking scheme for AES linear operations. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Chun Yang, Jinghui Xu, Shuangshuang Liang, Yanna Wu, Yu Wen, Boyang Zhang, Dan Meng DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Longquan Liu, Yanyan Zou, Chao Zhang 0008, Baoxu Liu ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1M. R. Gauthama Raman, Chuadhry Mujeeb Ahmed, Aditya Mathur Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ruigang Liang, Ying Cao 0006, Peiwei Hu, Kai Chen 0012 Neutron: an attention-based neural decompiler. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Xuzi Wang, Baofeng Wu, Lin Hou, Dongdai Lin Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Pei-Yi Lin, Chia-Wei Tien, Ting-Chun Huang, Chin-Wei Tien ICPFuzzer: proprietary communication protocol fuzzing by using machine learning and feedback strategies. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Alex Shafarenko Indexing structures for the PLS blockchain. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Chen Gao, Xuan Zhang 0002, Hui Liu Data and knowledge-driven named entity recognition for cyber security. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jonah Burgess, Philip O'Kane, Sakir Sezer, Domhnall Carlin LSTM RNN: detecting exploit kits using redirection chain sequences. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ansam Khraisat, Ammar Alazab A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yuhang Zhao, Ruigang Liang, Xiang Chen 0005, Jing Zou Evaluation indicators for open-source software: a review. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Shushan Arakelyan, Sima Arasteh, Christophe Hauser, Erik Kline, Aram Galstyan Bin2vec: learning representations of binary executable programs for security tasks. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Alex Shafarenko A PLS blockchain for IoT applications: protocols and architecture. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Zuoguang Wang, Hongsong Zhu, Peipei Liu, Limin Sun Social engineering in cybersecurity: a domain ontology and knowledge graph application examples. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sagar Sharma, Keke Chen Confidential machine learning on untrusted platforms: a survey. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Md. Shafiur Rahman, Sajal Halder, Md. Ashraf Uddin 0001, Uzzal Kumar Acharjee An efficient hybrid system for anomaly detection in social networks. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Gu Ban, Lili Xu, Yang Xiao, Xinhua Li, Zimu Yuan, Wei Huo B2SMatcher: fine-Grained version identification of open-Source software in binary files. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Waleed Alghamdi, Michael Schukat Precision time protocol attack strategies and their resistance to existing security extensions. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Wenqin Cao, Wentao Zhang Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Junpeng Xu, Haixia Chen, Xu Yang, Wei Wu 0001, Yongcheng Song Verifiable image revision from chameleon hashes. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Roee Leon, Michael Kiperberg, Anat Anatey Leon Zabag, Nezer Jacob Zaidenberg Hypervisor-assisted dynamic malware analysis. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Zhilong Wang, Peng Liu 0005 Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Huizhong Li, Guang Yang, Jingdian Ming, Yongbin Zhou, Chengbin Jin Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yiru Sun, Yanyan Liu An efficient fully dynamic group signature with message dependent opening from lattice. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Venkata Reddy Palleti, Sridhar Adepu, Vishrut Kumar Mishra, Aditya Mathur Cascading effects of cyber-attacks on interconnected critical infrastructure. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jianhua Wang, Xiaolin Chang, Yixiang Wang, Ricardo J. Rodríguez, Jianan Zhang LSGAN-AT: enhancing malware detector robustness against adversarial examples. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Hui Liu, Li Yang Quantum key recovery attack on SIMON32/64. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Runchen Gao, Shen Li, Yuqi Gao, Rui Guo A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Xiang Yin, Yanni Han, Zhen Xu 0009, Jie Liu VAECGAN: a generating framework for long-term prediction in multivariate time series. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Shafi Ullah, Raja Zahilah Raja Mohd Radzi Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Lulu Yang, Chen Li, Ruibang You, Bibo Tu, Linghui Li TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings. Search on Bibsonomy Cybersecur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Guanyu Li, Dong Du 0003, Yubin Xia Iso-UniK: lightweight multi-process unikernel through memory protection keys. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ximeng Liu, Robert H. Deng, Pengfei Wu, Yang Yang 0026 Lightning-fast and privacy-preserving outsourced computation in the cloud. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Shuzhou Sun, Hui Ma 0002, Rui Zhang 0002, Wenhan Xu Server-aided immediate and robust user revocation mechanism for SM9. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Shisen Fang, Shaojun Yang 0001, Yuexin Zhang Inner product encryption from ring learning with errors. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Florian Skopik, Timea Pahi Under false flag: using technical artifacts for cyber attack attribution. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yoon-Ho Choi, Peng Liu 0005, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou Using deep learning to solve computer security challenges: a survey. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yixiang Wang, ShaoHua Lv, Jiqiang Liu, Xiaolin Chang, Jinqiang Wang On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Rachid Ait Maalem Lahcen, Bruce D. Caulkins, Ram N. Mohapatra, Manish Kumar 0003 Review and insight on the behavioral aspects of cybersecurity. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tiago Espinha Gasiba, Ulrike Lechner, Maria Pinto-Albuquerque Sifu - a cybersecurity awareness platform with challenge assessment and intelligent coach. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Margus Välja, Fredrik Heiding, Ulrik Franke, Robert Lagerström Automating threat modeling using an ontology framework. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yuanzhao Song, Haowen Tan Practical pairing-Free sensor cooperation scheme for cloud-Assisted wireless body area networks. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Petar Radanliev, David De Roure, Kevin R. Page, Jason R. C. Nurse, Rafael Mantilla Montalvo, Omar Santos 0002, La Treall Maddox, Pete Burnap Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Samar Muslah Albladi, George R. S. Weir Predicting individuals' vulnerability to social engineering in social networks. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ayei E. Ibor, Florence A. Oladeji, Olusoji B. Okunoye, Obeten O. Ekabua Conceptualisation of Cyberattack prediction with deep learning. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Michael Schwarz 0001, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard Malware Guard Extension: abusing Intel SGX to conceal cache attacks. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hui Xu 0009, Yangfan Zhou, Jiang Ming 0002, Michael R. Lyu Layered obfuscation: a taxonomy of software obfuscation techniques for layered security. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sudhakar, Sushil Kumar 0001 An emerging threat Fileless malware: a survey and research challenges. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Fangli Ren, Zhengwei Jiang, Xuren Wang, Jian Liu A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yiwen Gao 0001, Yongbin Zhou, Wei Cheng 0003 Efficient electro-magnetic analysis of a GPU bitsliced AES implementation. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Serafeim P. Moustakidis, Patrik Karlsson A novel feature extraction methodology using Siamese convolutional neural networks for intrusion detection. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Lili Xu, Mingjie Xu, Feng Li, Wei Huo ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mohith Gowda HR, Adithya MV, Gunesh Prasad S, Vinay S Development of anti-phishing browser based on random forest and rule of extraction framework. Search on Bibsonomy Cybersecur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ahmet Okutan, Shanchieh Jay Yang ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yuejun Liu, Rui Zhang 0002, Yongbin Zhou Predicate encryption against master-key tampering attacks. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Xiayang Wang, Fuqian Huang, Haibo Chen 0001 DTrace: fine-grained and efficient data integrity checking with hardware instruction tracing. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Simon Parkinson, Saad Khan 0001, James Bray, Daiyaan Shreef Creeper: a tool for detecting permission creep in file system access controls. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yiru Sun, Yanyan Liu, Bo Wu An efficient full dynamic group signature scheme over ring. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ansam Khraisat, Iqbal Gondal, Peter Vamplew 0001, Joarder Kamruzzaman Survey of intrusion detection systems: techniques, datasets and challenges. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yan Wang, Wei Wu, Chao Zhang 0008, Xinyu Xing, Xiaorui Gong, Wei Zou From proof-of-concept to exploitable. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Li Yang, Hua Dong, Zhao Li One-way information reconciliation schemes of quantum key distribution. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Zhihao Wang, Hong Li 0004, Qiang Li 0007, Wei Li 0059, Hongsong Zhu, Limin Sun Towards IP geolocation with intermediate routers based on topology discovery. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Charles Morisset, Tim A. C. Willemse, Nicola Zannone A framework for the extended evaluation of ABAC policies. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yanyan Liu, Daode Zhang, Yi Deng 0002, Bao Li 0001 (Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Chaoqun Ma, Xiaolin Kong, Qiujun Lan, Zhongding Zhou The privacy protection mechanism of Hyperledger Fabric and its application in supply chain finance. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Naveen Kumar 0011, Anish Mathuria Comprehensive evaluation of key management hierarchies for outsourced data. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Manfred Vielberth, Florian Menges, Günther Pernul Human-as-a-security-sensor for harvesting threat intelligence. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Noora Hashim Alallaq, Muhmmad Al-Khiza'ay, Xin Han Group topic-author model for efficient discovery of latent social astroturfing groups in tourism domain. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shengye Wan, Yue Li 0002, Kun Sun 0001 PathMarker: protecting web contents against inside crawlers. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wenjie Li 0006, Dongpeng Xu 0001, Wei Wu, Xiaorui Gong, Xiaobo Xiang, Yan Wang, Fangming Gu, Qianxiang Zeng Memory access integrity: detecting fine-grained memory access errors in binary code. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Marco Benedetti, Marco Mori On the use of Max-SAT and PDDL in RBAC maintenance. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kanchana Devi V., Ganesan R. Semi Markov process inspired selfish aware co-operative scheme for wireless sensor networks (SMPISCS). Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Pietro Colombo, Elena Ferrari Access control technologies for Big Data management systems: literature review and future trends. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Manar Alohaly, Hassan Takabi, Eduardo Blanco 0002 Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Qingfeng Chen, Xu Zhang, Ruchang Zhang Privacy-preserving decision tree for epistasis detection. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tong Chen 0007, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Zhen Han Adversarial attack and defense in reinforcement learning-from AI security view. Search on Bibsonomy Cybersecur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Qionglu Zhang, Shijie Jia 0001, Bing Chang, Bo Chen Ensuring data confidentiality via plausibly deniable encryption and secure deletion - a survey. Search on Bibsonomy Cybersecur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ziqi Yang, Zhenkai Liang Automated identification of sensitive data from implicit user specification. Search on Bibsonomy Cybersecur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Qianqian Zhao, Kai Chen 0012, Tongxin Li, Yi Yang, XiaoFeng Wang 0001 Detecting telecommunication fraud by understanding the contents of a call. Search on Bibsonomy Cybersecur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhenbin Yan 0001, Yi Deng 0002, Yiru Sun Concurrent non-malleable zero-knowledge and simultaneous resettable non-malleable zero-knowledge in constant rounds. Search on Bibsonomy Cybersecur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bing Chang, Yingjiu Li, Qiongxiao Wang, Wen Tao Zhu, Robert H. Deng Making a good thing better: enhancing password/PIN-based user authentication with smartwatch. Search on Bibsonomy Cybersecur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Biao Wang, Xueqing Wang, Rui Xue 0001 CCA1 secure FHE from PIO, revisited. Search on Bibsonomy Cybersecur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Guozhu Meng, Ruitao Feng, Guangdong Bai, Kai Chen 0012, Yang Liu 0003 DroidEcho: an in-depth dissection of malicious behaviors in Android applications. Search on Bibsonomy Cybersecur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fabian Böhm, Florian Menges, Günther Pernul Graph-based visual analytics for cyber threat intelligence. Search on Bibsonomy Cybersecur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ahmet Okutan, Gordon Werner, Shanchieh Jay Yang, Katie McConky Forecasting cyberattacks with incomplete, imbalanced, and insignificant data. Search on Bibsonomy Cybersecur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jixin Zhang, Kehuan Zhang, Zheng Qin 0001, Hui Yin, Qixin Wu Sensitive system calls based packed malware variants detection using principal component initialized MultiLayers neural networks. Search on Bibsonomy Cybersecur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang 0001, Shuang Hao, Raheem Beyah Cloud repository as a malicious service: challenge, identification and implication. Search on Bibsonomy Cybersecur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jun Li 0001, Bodong Zhao, Chao Zhang 0008 Fuzzing: a survey. Search on Bibsonomy Cybersecur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dan Meng, Rui Hou 0001, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Peng Liu 0005 Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing. Search on Bibsonomy Cybersecur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ping Chen 0003, Zhisheng Hu, Jun Xu 0024, Minghui Zhu, Peng Liu 0005 Feedback control can make data structure layout randomization more cost-effective under zero-day attacks. Search on Bibsonomy Cybersecur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chen Tian 0004, Yazhe Wang, Peng Liu 0005, Qihui Zhou, Chengyi Zhang Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes. Search on Bibsonomy Cybersecur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lu Sun, Mingtian Tan, Zhe Zhou 0001 A survey of practical adversarial example attacks. Search on Bibsonomy Cybersecur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #199 of 199 (100 per page; Change: )
Pages: [<<][1][2]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license