Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Daniel Augot, Hervé Chabanne, Olivier Clémot, William George |
Transforming Face-to-Face Identity Proofing into Anonymous Digital Identity Using the Bitcoin Blockchain. |
PST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Janice Canedo, Anthony Skjellum |
Using machine learning to secure IoT systems. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kheng Kok Mar, ZhengQing Hu, Chee Yong Law, Meifen Wang |
Securing cloud data using information dispersal. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Michael T. Krieger, Josef Küng |
I've been - Web analytics from a user's point of view. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Rakan Alkhulaiwi, Abdulhakim Sabur, Khalid Aldughayem, Osama Almanna |
Survey of secure anonymous peer to peer Instant Messaging protocols. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Takeshi Takahashi 0001, Daisuke Inoue |
Generating software identifier dictionaries from Vulnerability Database. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Pei-Shan Chang, Hoon Sin Cheong, Hon Loon Wong, Seyedvahid Dianat, Cheong Seak Sea |
Secure intra-device communication protocol between applications on a smart device. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Michael Mireku Kwakye, Ken Barker 0001 |
Privacy-preservation in the integration and querying of multidimensional data models. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Takeharu Shirai, Masahiro Fujita, Daisuke Arai, Tomohiko Ogishi, Masakatsu Nishigaki |
Study on relationship between user awareness and QoE in communication delay on smartphones. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fatema Rashid, Ali Miri |
Secure image data deduplication through compressive sensing. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Naonori Kato, Yosuke Murakami, Toshiki Endo, Kazunari Nawa |
Study on privacy setting acceptance of the drivers for the data utilization on the car. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Anirban Basu 0001, Rui Xu 0006, Mohammad Shahriar Rahman, Shinsaku Kiyomoto |
User-in-a-context: A blueprint for context-aware identification. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ariana Mirian, Zane Ma, David Adrian, Matthew Tischer, Thasphon Chuenchujit, Tim Yardley, Robin Berthier, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael D. Bailey |
An Internet-wide view of ICS devices. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Federico Griscioli, Maurizio Pizzonia, Marco Sacchetti |
USBCheckIn: Preventing BadUSB attacks by forcing human-device interaction. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Bernhard, Gabe Stocco, J. Alex Halderman |
Implementing Attestable kiosks. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nada Essaouini, Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens |
Toward an off-line analysis of obligation with deadline policies. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Comb, Paul A. Watters |
Peeking behind the great firewall: Privacy on Chinese file sharing networks. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Rong Zhu, Yun Mao, Ying Guo |
A vessel segmentation method for low contrast CT angiography image. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | John Bjornson, Aaron Hunter 0001 |
Mobile forensics for cloud data: Practical and legal considerations. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Md. Sadek Ferdous, Ron Poet |
Formalising Identity Management protocols. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ahlem Kalaï, Wafa Abdelghani, Corinne Amel Zayani, Ikram Amous |
LoTrust: A social Trust Level model based on time-aware social interactions and interests similarity. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Shagufta Mehnaz, Elisa Bertino |
Building robust temporal user profiles for anomaly detection in file system accesses. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Bahman A. Sassani, Charly Abarro, Ivan Pitton, Craig Young, Farhad Mehdipour |
Analysis of NTP DRDoS attacks' performance effects and mitigation techniques. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Matthieu Faou, Antoine Lemay, David Décary-Hétu, Joan Calvet, Francois Labreche, Militza Jean, Benoit Dupont, José M. Fernandez 0001 |
Follow the traffic: Stopping click fraud by disrupting the value chain. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sarah Asiri, Ali Miri |
An IoT trust and reputation model based on recommender systems. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Wüller, Wadim Pessin, Ulrike Meyer, Susanne Wetzel |
Privacy-preserving two-party bartering secure against active adversaries. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani 0001 |
Measuring code reuse in Android apps. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Moesfa Soeheila Mohamad, Ji-Jian Chin, Geong Sen Poh |
On the security advantages of block-based multiserver searchable symmetric encryption. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Ju Lee, Eric Wustrow |
OverTorrent: Anticensorship without centralized servers. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | David Lacey, Jim Zaiss, K. Suzanne Barber |
Understanding victim-enabled identity theft. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Friebe, Martin Florian, Ingmar Baumgart |
Decentralized and sybil-resistant pseudonym registration using social graphs. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Zhenhua Tan, Yicong Niu, Yuan Liu 0002, Guangming Yang |
A novel trust model based on SLA and behavior evaluation for clouds. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Su Mon Kywe, Yingjiu Li, Kunal Petal, Michael Grace |
Attacking Android smartphone systems without permissions. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Chin-Shyurng Fahn, Chu-Ping Lee, Heng-I Chen |
A text independent handwriting forgery detection system based on branchlet features and Gaussian mixture models. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yuta Kurihara, Masakazu Soshi |
A novel hash chain construction for simple and efficient authentication. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hossein Hadian Jazi, Ali A. Ghorbani 0001 |
Dynamic graph-based malware classifier. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Andrii Shalaginov, Katrin Franke |
Automated intelligent multinomial classification of malware species using dynamic behavioural analysis. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mordechai Guri, Matan Monitz, Yuval Elovici |
USBee: Air-gap covert-channel via electromagnetic emission from USB. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jacqueline Brendel, Denise Demirel |
Efficient proactive secret sharing. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Toshiki Endo, Kazunari Nawa, Naonori Kato, Yosuke Murakami |
Study on privacy setting acceptance of drivers for data utilization on connected cars. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nico Schlitter, Markus Ullrich, Jörg Lässig |
Scalability and performance of the Privacy-Aware Classification method GenPAC. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mike Moody, Aaron Hunter 0001 |
Exploiting known vulnerabilities of a smart thermostat. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli, Francesco Mercaldo, Andrea Saracino, Corrado Aaron Visaggio |
I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mehmood Baryalai, Julian Jang-Jaccard, Dongxi Liu |
Towards privacy-preserving classification in neural networks. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Maheswara Rao Valluri |
Digital signature scheme based on truncated polynomial over finite fields. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kyusuk Han, Kang G. Shin |
Prevention of information mis-translation by a malicious gateway in connected vehicles. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Huan Feng, Kang G. Shin |
Masquerade of mobile applications: Introducing unlinkability in a practical way. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Dianxiang Xu, Shuai Peng |
Towards automatic repair of access control policies. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Dominik Herrmann, Matthias Kirchler, Jens Lindemann 0001, Marius Kloft |
Behavior-based tracking of Internet users with semi-supervised learning. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Galoh Rashidah Haron, Dharmadharshni Maniam, Latifah Mat Nen, Nor Izyani Daud |
User behaviour and interactions for multimodal authentication. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Limei Guo, Yun Mao, Ying Guo |
Non-invertible fingerprint template protection with polar transformations. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Maryam Davari, Mohammad Zulkernine |
Analysing vulnerability reproducibility for Firefox browser. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sreenivas Sremath Tirumala, Abdolhossein Sarrafzadeh, Paul Pang |
A survey on internet usage and cybersecurity awareness in students. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Rishabh Kaushal, Srishty Saha, Payal Bajaj, Ponnurangam Kumaraguru |
KidsTube: Detection, characterization and analysis of child unsafe content & promoters on YouTube. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Garcia Cordero, Sascha Hauke, Max Mühlhäuser, Mathias Fischer 0001 |
Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Iznan Husainy Hasbullah, Mohammad M. Kadhum, Yung-Wey Chong, Kamal Alieyan, Azlan Osman, Supriyanto |
Timestamp utilization in Trust-ND mechanism for securing Neighbor Discovery Protocol. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sujit Kumar Basak, Desmond Wesley Govender, Irene Govender |
Examining the impact of privacy, Security, and trust on the TAM and TTF models for e-commerce consumers: A pilot study. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Md Siam Hasan, Ali ElShakankiry, Thomas R. Dean, Mohammad Zulkernine |
Intrusion detection in a private network by satisfying constraints. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Khaliqur Rahman, Muhammad Abdullah Adnan |
Dynamic Weight on Static Trust for trustworthy social media networks. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sazzad Hossain, Alwyn Goh, Hoon Sin Cheong, Kay Win Lee |
Generation of one-time keys for single line authentication. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Etienne Cartolano, Antonio Mauro Saraiva, Robert D. Stevenson |
PlayGround 2.0: Simulating behavior decisions with trust and control computations. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Alwyn Goh, Hoon Sin Cheong, Geong Sen Poh, Seyedvahid Dianat |
Remote website authentication using dynamic multi-scale code visualization. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Anindya Shankar Bhandari, Dipanwita Roy Chowdhury |
SCARAB: A continuous authentication scheme for biomedical application. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia |
Towards a new generation of industrial firewalls: Operational-process aware filtering. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Oluwakemi Hambolu, Lu Yu 0001, Jon Oakley, Richard R. Brooks, Ujan Mukhopadhyay, Anthony Skjellum |
Provenance threat modeling. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ilya Kabanov |
Effective frameworks for delivering compliance with personal data privacy regulatory requirements. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Min Wang 0009, Hussein A. Abbass, Jiankun Hu |
Continuous authentication using EEG and face images for trusted autonomous systems. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tobias Wüchner, Martín Ochoa, Enrico Lovat, Alexander Pretschner |
Generating behavior-based malware detection models with genetic programming. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Noria Foukia, David Billard, Eduardo Solana |
PISCES: A framework for privacy by design in IoT. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Munalih Ahmad Syarif, Latifah Mat Nen, Alwyn Goh, Kay Win Lee, Kang Siong Ng, Leslie Ching Ow Tiong |
Challenge response interaction for biometric liveness establishment and template protection. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Max Smith-Creasey, Muttukrishnan Rajarajan |
A continuous user authentication scheme for mobile devices. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Anbar, Rosni Abdullah, Iznan Husainy Hasbullah, Yung-Wey Chong, Omar E. Elejla |
Comparative performance analysis of classification algorithms for intrusion detection system. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Federico Griscioli, Maurizio Pizzonia |
Securing promiscuous use of untrusted USB thumb drives in Industrial Control Systems. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Bede Ravindra Amarasekara, Anuradha Mathrani |
Controlling risks and fraud in affiliate marketing: A simulation and testing environment. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mehrdad Nojoumian |
Unconditionally secure proactive verifiable secret sharing using new detection and recovery techniques. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ujan Mukhopadhyay, Anthony Skjellum, Oluwakemi Hambolu, Jon Oakley, Lu Yu 0001, Richard R. Brooks |
A brief survey of Cryptocurrency systems. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Thiago S. Rocha, Eduardo Souto, Brandell Cassio, Diego Azulay, Alex Monteiro, Felipe Boeira, Pedro Minatel, Breno Silva |
Data leakage detection in Tizen Web applications. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hanif-Mohaddes Deylami, Ravie Chandren Muniyandi, Iman Tabatabaei Ardekani, Abdolhossein Sarrafzadeh |
Taxonomy of malware detection techniques: A systematic literature review. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Abhinav, Mohit Mishra, Benoit Baudry |
libmask: Protecting browser JIT engines from the devil in the constants. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ping Ren, Wu Liu, Donghong Sun, Jian-Ping Wu, Ke Liu |
Analysis and forensics for Behavior Characteristics of Malware in Internet. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Clemens Zeidler, Muhammad Rizwan Asghar |
CloudEFS: Efficient and secure file system for cloud storage. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mario Luca Bernardi, Marta Cimitile, Damiano Distante, Francesco Mercaldo |
A constraint-driven approach for dynamic malware detection. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Abdulaziz Almehmadi, Khalil El-Khatib |
Intention-based Trust Re-evaluation. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Chin-Ling Chen, Yong-Yuan Deng, Yun-Ciao Wang |
Cryptanalysis of Lee and Lin's innovative electronic group-buying system. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hsiao-Ying Huang, Masooda N. Bashir |
Users' perspective on designing inclusive privacy-enhancing indicators. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Geihs, Denise Demirel, Johannes Buchmann 0001 |
A security analysis of techniques for long-term integrity protection. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Giulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann 0001 |
AS3: Adaptive social secret sharing for distributed storage systems. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yasushi Shinjo, Naoki Kainuma, Daiyuu Nobori, Akira Sato |
Magic mantle using social VPNs against centralized social networking services. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kouya Tochikubo |
Improvement of information rates for specified participants in general secret sharing schemes. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Robert Koch 0002, Teo Kuhn, Marcel Odenwald, Gabi Dreo Rodosek |
Dr. WATTson: Lightweight current-based Intrusion Detection (CBID). |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hoang Giang Do, Wee Keong Ng |
Multidimensional range query on outsourced database with strong privacy guarantee. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Solenn Brunet, Sébastien Canard, Sébastien Gambs, Baptiste Olivier |
Edge-calibrated noise for differentially private mechanisms on graphs. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Wencheng Yang, Jiankun Hu, Clinton Fernandes, Vijay Sivaraman, Qianhong Wu |
Vulnerability analysis of iPhone 6. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hamid Ebadi, Thibaud Antignac, David Sands 0001 |
Sampling and partitioning for differential privacy. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Aaron Hunter 0001 |
A logical approach to promoting trust over knowledge to trust over action. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Clemens Martin, Rania Nasr, Mark Hoersken, Tobias Fuechtler |
Automating Information Security assessments using intelligent software agents. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mahendra Pratap Singh |
AHCSABAC: Attribute value hierarchies and constraints specification in attribute-based access control. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Clark D. Thomborson |
Privacy patterns. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mordechai Guri, Ofer Hasson, Gabi Kedma, Yuval Elovici |
An optical covert-channel to leak data through an air-gap. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ayane Sano, Masahiro Fujita, Masakatsu Nishigaki |
Directcha: A proposal of spatiometric mental rotation CAPTCHA. |
PST |
2016 |
DBLP DOI BibTeX RDF |
|