


default search action
Security and Communication Networks, Volume 2018
Volume 2018, 2018
- Shin-Yan Chiou
, Ching-Hsuan Lin:
An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment. 9146297:1-9146297:15 - Pengcheng Cao, Weiwei Liu
, Guangjie Liu
, Xiaopeng Ji
, Jiangtao Zhai
, Yuewei Dai:
A Wireless Covert Channel Based on Constellation Shaping Modulation. 1214681:1-1214681:15 - Jinpei Yan
, Yong Qi
, Qifan Rao:
LSTM-Based Hierarchical Denoising Network for Android Malware Detection. 5249190:1-5249190:18 - Yadong Zhou
, Kaiyue Chen, Junjie Zhang, Junyuan Leng, Yazhe Tang:
Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense. 4760632:1-4760632:15 - Tao Wang
, Hongchang Chen, Guozhen Cheng, Yulin Lu:
SDNManager: A Safeguard Architecture for SDN DoS Attacks Based on Bandwidth Prediction. 7545079:1-7545079:16 - Che Zhang
, Hong Xu
, Libin Liu
, Zhixiong Niu, Peng Wang:
Kuijia: Traffic Rescaling in Software-Defined Data Center WANs. 6361901:1-6361901:12 - Min Zhao
, Yan Xing, Xiao-Wei Li, Qiong-Hua Wang
:
Two-Step Integral Imaging Coding Based Three-Dimensional Information Encryption Approach. 2658318:1-2658318:9 - Ahmed Almusawi
, Haleh Amintoosi
:
DNS Tunneling Detection Method Based on Multilabel Support Vector Machine. 6137098:1-6137098:9 - Xiaoguang Niu
, Jiawei Wang
, Qiongzan Ye
, Yihao Zhang
:
A Privacy-Preserving Incentive Mechanism for Participatory Sensing Systems. 2593537:1-2593537:15 - Wenwen Fu
, Tao Li
, Zhigang Sun:
FAS: Using FPGA to Accelerate and Secure SDN Software Switches. 5650205:1-5650205:13 - Owen Lo
, William J. Buchanan
, Paul Griffiths, Richard Macfarlane:
Distance Measurement Methods for Improved Insider Threat Detection. 5906368:1-5906368:18 - Yongjae Lee, Seunghyeon Lee, Hyunmin Seo, Changhoon Yoon, Seungwon Shin
, Hyunsoo Yoon:
Duo: Software Defined Intrusion Tolerant System Using Dual Cluster. 6751042:1-6751042:13 - Huan Wang
, Hongxia Wang
:
Perceptual Hashing-Based Image Copy-Move Forgery Detection. 6853696:1-6853696:11 - Yu Sun
, Rongrong Ni
, Yao Zhao:
Nonoverlapping Blocks Based Copy-Move Forgery Detection. 1301290:1-1301290:11 - Chao Qi
, Jiangxing Wu, Guozhen Cheng, Jianjian Ai, Shuo Zhao:
Security Analysis of Dynamic SDN Architectures Based on Game Theory. 4123736:1-4123736:10 - Jiawei Tang, Anfeng Liu
, Ming Zhao
, Tian Wang:
An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks. 6328504:1-6328504:30 - Biao Han, Xiangrui Yang
, Zhigang Sun, Jinfeng Huang, Jinshu Su
:
OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN. 9649643:1-9649643:15 - Jinsoo Park
, Gangsan Kim, Hong-Yeop Song
, Chanki Kim
, Jong-Seon No, Suil Kim:
Analysis of Iterative Erasure Insertion and Decoding of FH/MFSK Systems without Channel State Information. 7318043:1-7318043:12 - Zhixiong Zheng
, Haibo Cheng
, Zijian Zhang
, Yiming Zhao
, Ping Wang
:
An Alternative Method for Understanding User-Chosen Passwords. 6160125:1-6160125:12 - Fang Liu
, Tong Li:
A Clustering k-Anonymity Privacy-Preserving Method for Wearable IoT Devices. 4945152:1-4945152:8 - Shang-Chiuan Su, Yi-Ren Chen, Shi-Chun Tsai
, Yi-Bing Lin:
Detecting P2P Botnet in Software Defined Networks. 4723862:1-4723862:13 - Jian Shen
, Jun Shen, Chin-Feng Lai
, Qi Liu, Tianqi Zhou:
Cloud Based Data Protection in Anonymously Controlled SDN. 9845426:1-9845426:8 - Ihsan H. Abdulqadder
, Deqing Zou, Israa T. Aziz
, Bin Yuan:
Validating User Flows to Protect Software Defined Network Environments. 1308678:1-1308678:14 - Xianyi Chen
, Haidong Zhong, Lizhi Xiong, Zhihua Xia
:
Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion. 1326235:1-1326235:9 - Dawen Xu
, Kai Chen, Rangding Wang, Shubing Su:
Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification. 1734961:1-1734961:14 - ByungRae Cha
, Sun Park
, JongWon Kim, Sung Bum Pan
, Juhyun Shin
:
International Network Performance and Security Testing Based on Distributed Abyss Storage Cluster and Draft of Data Lake Framework. 1746809:1-1746809:14 - Tianliang Lu
, Lu Zhang
, Yixian Fu
:
A Novel Immune-Inspired Shellcode Detection Algorithm Based on Hyperellipsoid Detectors. 2063089:1-2063089:10 - Haibo Yi
:
Under Quantum Computer Attack: Is Rainbow a Replacement of RSA and Elliptic Curves on Hardware? 2369507:1-2369507:9 - Dongmei Niu
, Hongxia Wang
, Minquan Cheng, Canghong Shi:
Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction. 2516324:1-2516324:12 - Chong Fu
, Gao-yuan Zhang, Mai Zhu, Zhe Chen, Weimin Lei:
A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy. 2708532:1-2708532:13 - Hongchen Wu
, Huaxiang Zhang, Lizhen Cui, Xinjun Wang:
A Heuristic Model for Supporting Users' Decision-Making in Privacy Disclosure for Recommendation. 2790373:1-2790373:13 - Pengdeng Li, Xiaofan Yang
, Qingyu Xiong
, Junhao Wen, Yuan Yan Tang
:
Defending against the Advanced Persistent Threat: An Optimal Control Approach. 2975376:1-2975376:14 - Shuang Zhao, Xiapu Luo, Xiaobo Ma
, Bo Bai, Yankang Zhao, Wei Zou, Zeming Yang, Man Ho Au, Xinliang Qiu:
Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing. 3182402:1-3182402:22 - Ady Wahyudi Paundu
, Doudou Fall, Daisuke Miyamoto, Youki Kadobayashi:
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment. 4216240:1-4216240:18 - Dongdong Zhao, Shu Fang, Jianwen Xiang
, Jing Tian, Shengwu Xiong
:
Iris Template Protection Based on Local Ranking. 4519548:1-4519548:9 - Zhihui Chu
, Huaifeng Chen
, Xiaoyun Wang
, Xiaoyang Dong
, Lu Li
:
Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques. 5160237:1-5160237:11 - Ming Luo
, Yi Luo, Yuwei Wan, Ze Wang:
Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT. 6140978:1-6140978:10 - Xuyun Zhang
, Julian Jang-Jaccard, Lianyong Qi
, Md. Zakirul Alam Bhuiyan
, Chang Liu:
Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications. 6238607:1-6238607:3 - Wilson S. Melo
, Raphael C. S. Machado
, Luiz Fernando Rust da Costa Carmo:
Using Physical Context-Based Authentication against External Attacks: Models and Protocols. 6590928:1-6590928:14 - Jin Cao
, Hui Li, Maode Ma
, Fenghua Li:
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks. 6854612:1-6854612:16 - Miao Yu
, Yongzheng Zhang
, Tianning Zang, Yipeng Wang, Yijing Wang:
Information Propagation Prediction Based on Key Users Authentication in Microblogging. 7024842:1-7024842:7 - Junhui He
, Junxi Chen, Shichang Xiao, Xiaoyu Huang
, Shaohua Tang:
A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition. 7080673:1-7080673:11 - Michele De Donno
, Nicola Dragoni
, Alberto Giaretta
, Angelo Spognardi:
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. 7178164:1-7178164:30 - Kang-Leng Chiew
, Jeffrey Choo Soon Fatt, San-Nah Sze
, Kelvin Sheng Chek Yong:
Leverage Website Favicon to Detect Phishing Websites. 7251750:1-7251750:11 - Binh Van Nguyen
, Hyoyoung Jung
, Kiseon Kim
:
On the Antijamming Performance of the NR-DCSK System. 7963641:1-7963641:8 - Chenglong Cao
, Xiaoling Zhu
:
Practical Secure Transaction for Privacy-Preserving Ride-Hailing Services. 8053967:1-8053967:8 - Tianqi Zhou, Jian Shen
, Xiong Li
, Chen Wang, Jun Shen:
Quantum Cryptography for the Future Internet and the Security Analysis. 8214619:1-8214619:7 - Baraka D. Sija
, Young-Hoon Goo
, Kyu-Seok Shim
, Huru Hasanova
, Myung-Sup Kim
:
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View. 8370341:1-8370341:17 - Hyeonseong Jo
, Jaehyun Nam
, Seungwon Shin
:
NOSArmor: Building a Secure Network Operating System. 9178425:1-9178425:14 - Ping Zhang
, Honggang Hu, Qian Yuan:
Close to Optimally Secure Variants of GCM. 9715947:1-9715947:12 - Yu Yao
, Qiang Fu
, Wei Yang, Ying Wang, Chuan Sheng:
An Epidemic Model of Computer Worms with Time Delay and Variable Infection Rate. 9756982:1-9756982:11 - Ming Li
, Haiju Fan
, Hua Ren
, Dandan Lu
, Di Xiao
, Yang Li
:
Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain. 9803519:1-9803519:12 - Haitao He, Chun Shan
, Xiangmin Tian
, Yalei Wei, Guoyan Huang:
Analysis on Influential Functions in the Weighted Software Network. 1525186:1-1525186:10 - Rui Zhang
, Di Xiao
, Yanting Chang
:
A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing. 1591206:1-1591206:15 - Hyun-Gu Lee
, Jung Yeon Hwang
, Dong In Kim
, Shincheol Lee
, Sung-Hoon Lee
, Ji Sun Shin
:
Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors. 2567463:1-2567463:10 - Suk-Hwan Lee
:
Reversible Data Hiding for DNA Sequence Using Multilevel Histogram Shifting. 3530969:1-3530969:13 - So Ryoung Park
, Ilku Nam, Sanguk Noh:
Modeling and Simulation for the Investigation of Radar Responses to Electronic Attacks in Electronic Warfare Environments. 3580536:1-3580536:13 - Tomás Bajtos, Andrej Gajdos
, Lenka Kleinova, Katarína Lucivjanská
, Pavol Sokol
:
Network Intrusion Detection with Threat Agent Profiling. 3614093:1-3614093:17 - Kyle Coffey, Richard Smith, Leandros Maglaras
, Helge Janicke
:
Vulnerability Analysis of Network Scanning on SCADA Systems. 3794603:1-3794603:21 - Zhiyuan Jiang, Chao Feng
, Chaojing Tang:
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression. 4610320:1-4610320:21 - Tanping Zhou
, Ningbo Li, Xiaoyuan Yang
, Liqun Lv, Yitao Ding, Xu An Wang
:
Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme. 4635715:1-4635715:12 - Lu Ou
, Hui Yin
, Zheng Qin
, Sheng Xiao
, Guangyi Yang, Yupeng Hu:
An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme. 4724815:1-4724815:11 - Dianyan Xiao
, Yang Yu
:
Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption. 4957045:1-4957045:9 - HyunSeo Kang
, YoonJe Sung, HyoungJun Kwon
, SugJoon Yoon
, SangYeong Choi:
An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development. 5150730:1-5150730:12 - Qian Wang
, Jiadong Ren, Xiaoli Yang, Yongqiang Cheng
, Darryl N. Davis, Changzhen Hu:
Security Feature Measurement for Frequent Dynamic Execution Paths in Software System. 5716878:1-5716878:10 - Hongliang Zhu
, Meiqi Chen, Maohua Sun
, Xin Liao
, Lei Hu:
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing. 5841967:1-5841967:12 - Wencheng Sun, Zhiping Cai
, Yangyang Li, Fang Liu, Shengqun Fang, Guoyan Wang:
Security and Privacy in the Medical Internet of Things: A Review. 5978636:1-5978636:9 - Xiue Gao, Duoping Zhang, Keqiu Li, Bo Chen
:
A Cascading Failure Model for Command and Control Networks with Hierarchy Structure. 6063837:1-6063837:14 - Xia ShuangKui, Jianbin Wu
:
A Modification-Free Steganography Method Based on Image Information Entropy. 6256872:1-6256872:8 - Dan Li, Jiazhe Chen
, An Wang, Xiaoyun Wang
:
Analysis of Software Implemented Low Entropy Masking Schemes. 7206835:1-7206835:8 - Jinpei Yan
, Yong Qi
, Qifan Rao:
Detecting Malware with an Ensemble Method Based on Deep Neural Network. 7247095:1-7247095:16 - Zilong Jiang
, Chenhui Jin:
Multiple Impossible Differentials Cryptanalysis on 7-Round ARIA-192. 7453572:1-7453572:11 - Pham-Duy Thanh
, Hiep-Vu Van
, Insoo Koo
:
Efficient Channel Selection and Routing Algorithm for Multihop, Multichannel Cognitive Radio Networks with Energy Harvesting under Jamming Attacks. 7543212:1-7543212:12 - Shuhui Zhang
, Xiangxu Meng
, Lianhai Wang, Lijuan Xu, Xiaohui Han:
Secure Virtualization Environment Based on Advanced Memory Introspection. 9410278:1-9410278:16 - Emanuel Ferreira Jesus
, Vanessa R. L. Chicarino, Célio Vinicius N. de Albuquerque
, Antônio A. de A. Rocha:
A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack. 9675050:1-9675050:27 - Qi Zhang
, An Wang
, Yongchuan Niu
, Ning Shang
, Rixin Xu
, Guoshuang Zhang
, Liehuang Zhu
:
Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9. 9701756:1-9701756:14 - Yanan Chen, Zhenyu Lu, Hu Xiong
, Weixiang Xu:
Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario. 1378583:1-1378583:14 - Jorge Granjal
, Artur Pedroso
:
An Intrusion Detection and Prevention Framework for Internet-Integrated CoAP WSN. 1753897:1-1753897:14 - Barnali Gupta Banik
, Samir Kumar Bandyopadhyay
:
Blind Key Based Attack Resistant Audio Steganography Using Cocktail Party Effect. 1781384:1-1781384:21 - Yun Chen
, Kun Lv
, Changzhen Hu
:
A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments. 2058429:1-2058429:12 - Chunming Zhang
:
Global Behavior of a Computer Virus Propagation Model on Multilayer Networks. 2153195:1-2153195:9 - Heng Zhang, Zhiping Cai
, Qiang Liu
, Qingjun Xiao, Yangyang Li, Chak-Fong Cheang:
A Survey on Security-Aware Measurement in SDN. 2459154:1-2459154:14 - Hyunwoo Choi
, Yongdae Kim
:
Large-Scale Analysis of Remote Code Injection Attacks in Android Apps. 2489214:1-2489214:17 - Kevser Ovaz Akpinar
, Ibrahim Özçelik
:
Development of the ECAT Preprocessor with the Trust Communication Approach. 2639750:1-2639750:16 - Gaofeng He, Bingfeng Xu
, Haiting Zhu:
AppFA: A Novel Approach to Detect Malicious Android Applications on the Network. 2854728:1-2854728:15 - Chun Shan
, Benfu Jiang, Jingfeng Xue
, Fang Guan, Na Xiao:
An Approach for Internal Network Security Metric Based on Attack Probability. 3652170:1-3652170:11 - Bryan Monk, Julianna Mitchell
, Richard Frank, Garth Davies:
Uncovering Tor: An Examination of the Network Structure. 4231326:1-4231326:12 - Junxin Chen
, Leo Yu Zhang
, Yushu Zhang, Fabio Pareschi
, Yu-Dong Yao:
Exploiting the Security Aspects of Compressive Sampling. 4740174:1 - Milad Taleby Ahvanooey
, Qianmu Li
, Hiuk Jae Shim, Yanyan Huang:
A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents. 5325040:1-5325040:22 - Shahid Mahmood
, Shabieh Farwa
, Muhammad Rafiq, Syed Muhammad Jawwad Riaz, Tariq Shah, Sajjad Shaukat Jamal:
To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers. 5823230:1-5823230:8 - Fucai Luo
, Fuqun Wang, Kunpeng Wang, Jie Li, Kefei Chen:
LWR-Based Fully Homomorphic Encryption, Revisited. 5967635:1-5967635:12 - Jean Caminha
, Angelo Perkusich
, Mirko Barbosa Perkusich
:
A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things. 6063456:1-6063456:10 - Yao Wang
, Wan-Dong Cai, Pin Lyu, Wei Shao
:
A Combined Static and Dynamic Analysis Approach to Detect Malicious Browser Extensions. 7087239:1-7087239:16 - Qianqian Yang
, Lei Hu
, Danping Shi, Yosuke Todo
, Siwei Sun:
On the Complexity of Impossible Differential Cryptanalysis. 7393401:1-7393401:11 - Krzysztof Szczypiorski
, Liqiang Wang, Xiangyang Luo
, Dengpan Ye:
Big Data Analytics for Information Security. 7657891:1-7657891:2 - Tongxiang Wang
, Xianglin Wei
, Jianhua Fan
, Tao Liang:
Jammer Localization in Multihop Wireless Networks Based on Gravitational Search. 7670939:1-7670939:11 - Yongbin Zeng
, Hui Guang, Guangsong Li
:
Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks. 8470949:1-8470949:9 - Reihaneh Safavi-Naini
, Alireza Poostindouz, Viliam Lisý:
Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication. 8475818:1-8475818:15 - Chenyu Wang
, Guoai Xu
, Wenting Li:
A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment. 9062675:1-9062675:15 - Yuntao Zhao
, Wenbo Zhang
, Yongxin Feng
, Bo Yu:
A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack. 9463653:1-9463653:8 - Hongyu Wang
, Jin Xu, Mingyuan Ma, Hongyan Zhang:
A New Type of Graphical Passwords Based on Odd-Elegant Labelled Graphs. 9482345:1-9482345:11 - Luca Caviglione
, Wojciech Mazurczyk
, Steffen Wendzel
, Sebastian Zander:
Emerging and Unconventional: New Attacks and Innovative Detection Techniques. 9672523:1 - Jin Ye, Xiangyang Cheng
, Jian Zhu, Luting Feng, Ling Song
:
A DDoS Attack Detection Method Based on SVM in Software Defined Network. 9804061:1-9804061:8 - Mohamed Idhammad
, Karim Afdel, Mustapha Belouch
:
Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest. 1263123:1-1263123:13 - Wonsuk Choi, Youngkyung Lee, Duhyeong Lee, Hyoseung Kim, Jin Hyung Park, In Seok Kim, Dong Hoon Lee
:
Less Communication: Energy-Efficient Key Exchange for Securing Implantable Medical Devices. 1809302:1-1809302:16 - Ali El Ksimi
, Leghris Cherkaoui
:
Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks. 1816462:1-1816462:11 - Evgenia Novikova
, Yana A. Bekeneva
, Andrey Shorov
:
The Motif-Based Approach to the Analysis of the Employee Trajectories within Organization. 2476968:1-2476968:12 - Ye Yuan
, Liji Wu
, Yijun Yang
, Xiangmin Zhang:
A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism. 2483619:1-2483619:13 - Yulong Wang
, Junjie Yi
, Jun Guo
, Yanbo Qiao, Mingyue Qi
, Qingyu Chen
:
A Semistructured Random Identifier Protocol for Anonymous Communication in SDN Network. 2916356:1-2916356:20 - Bo Zhang
, Zhongtian Jia, Chuan Zhao:
An Efficient Certificateless Generalized Signcryption Scheme. 3578942:1-3578942:11 - Chen Wang
, Jian Shen
, Qi Liu, Yongjun Ren, Tong Li
:
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things. 3680851:1-3680851:7 - Xin Su
, Ziyu Wang, Xiaofeng Liu, Chang Choi
, Dongmin Choi
:
Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures. 4296934:1-4296934:14 - Manhua Liu
, Shuxin Liu
, Weiwu Yan
:
Latent Fingerprint Segmentation Based on Ridge Density and Orientation Consistency. 4529652:1-4529652:10 - Yi-Hong Du
, Shi-Hua Liu
:
Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks. 4691203:1-4691203:7 - Jun Xu, Xiong Zhang
, Meng Zhou:
A High-Security and Smart Interaction System Based on Hand Gesture Recognition for Internet of Things. 4879496:1-4879496:11 - Qingyi Zhu
, Seng W. Loke, Ye Zhang:
State-Based Switching for Optimal Control of Computer Virus Propagation with External Device Blocking. 4982523:1-4982523:10 - Chunming Zhang
, Jingwei Xiao:
Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model. 5353060:1-5353060:10 - Irene Arsuaga
, Nerea Toledo
, Igor Lopez
, Marina Aguado
:
A Framework for Vulnerability Detection in European Train Control Railway Communications. 5634181:1-5634181:9 - Ding Wang
, Shujun Li, Qi Jiang
:
User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs. 6150491:1-6150491:2 - Zhen-Hao Zhang
, Yurong Song
, Ling-Ling Xia, Yinwei Li
, Liang Zhang
, Guo-Ping Jiang
:
A Novel Load Capacity Model with a Tunable Proportion of Load Redistribution against Cascading Failures. 6254876:1-6254876:7 - Yang Xu
, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, Yaoxue Zhang:
A Feasible Fuzzy-Extended Attribute-Based Access Control Technique. 6476315:1-6476315:11 - Gábor Danner
, Árpád Berta
, István Hegedüs
, Márk Jelasity
:
Robust Fully Distributed Minibatch Gradient Descent with Privacy Preservation. 6728020:1-6728020:15 - Huanran Wang
, Hui He
, Weizhe Zhang
:
Demadroid: Object Reference Graph-Based Malware Detection in Android. 7064131:1-7064131:16 - Faouzi Jaïdi
, Faten Labbene Ayachi, Adel Bouhoula:
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures. 7142170:1-7142170:22 - Songjie Wei
, Shuai Li
, Peilong Liu
, Meilin Liu
:
BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys. 7202806:1-7202806:14 - Run Xie, Chanlian He, Dongqing Xie, Chongzhi Gao
, Xiaojun Zhang:
A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage. 7254305:1-7254305:7 - Fangfang Shan
, Hui Li, Fenghua Li, Yunchuan Guo
, Ben Niu:
HAC: Hybrid Access Control for Online Social Networks. 7384194:1-7384194:11 - Lihua Yin, Yanwei Sun
, Zhen Wang, Yunchuan Guo
, Fenghua Li, Binxing Fang:
Security Measurement for Unknown Threats Based on Attack Preferences. 7412627:1-7412627:13 - Xiajing Wang
, Rui Ma
, Bowen Dou
, Zefeng Jian
, Hongzhou Chen
:
OFFDTAN: A New Approach of Offline Dynamic Taint Analysis for Binaries. 7693861:1-7693861:13 - Zhiping Cai
, Chengchen Hu, Kai Zheng, Yang Xu
, Qiang Fu
:
Network Security and Management in SDN. 7928503:1-7928503:2 - Guoquan Li, Zheng Yan
, Yulong Fu
, Hanlu Chen:
Data Fusion for Network Intrusion Detection: A Review. 8210614:1-8210614:16 - Zhuo Ma
, Jiuxin Cao
, Xiusheng Chen, Shuai Xu, Bo Liu
, Yuntao Yang:
GLPP: A Game-Based Location Privacy-Preserving Framework in Account Linked Mixed Location-Based Services. 9148768:1-9148768:14 - Yan Zhao
, Shiming Li, Liehui Jiang:
Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment. 9178941:1-9178941:13 - Jong-Hwan Lee, Jeungmin Joo, Kichul Kim, Jung-Hoon Lee
, Young-Ju Park:
Practical Consideration Factors to Design Array Configuration of Direction Finding System for Airborne Signal Intelligence. 9185760:1-9185760:9 - Bruno Carpentieri
:
Efficient Compression and Encryption for Digital Data Transmission. 9591768:1-9591768:9 - Thomas D. Wagner
, Esther Palomar
, Khaled Mahbub, Ali E. Abdallah:
A Novel Trust Taxonomy for Shared Cyber Threat Intelligence. 9634507:1-9634507:11 - Dongyoung Roh
, Sangim Jung
, Daesung Kwon:
Winternitz Signature Scheme Using Nonadjacent Forms. 1452457:1-1452457:12 - Christopher M. Rondeau
, J. Addison Betances, Michael A. Temple
:
Securing ZigBee Commercial Communications Using Constellation Based Distinct Native Attribute Fingerprinting. 1489347:1-1489347:14 - John Patrick Barrowclough, Rameez Asif
:
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. 1681908:1-1681908:20 - Amir Anees
, Iqtadar Hussain
, Abdulmohsen Algarni
, Muhammad Aslam
:
A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map. 1840207:1-1840207:20 - Libing Wu
, Zhiyan Xu
, Debiao He
, Xianmin Wang
:
New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment. 2595273:1-2595273:13 - Maha Shamseddine, Wassim Itani
, Ali Chehab
, Ayman I. Kayssi:
Network Programming and Probabilistic Sketching for Securing the Data Plane. 2905730:1-2905730:23 - Lianmin Shi
, Yihuai Wang
, Zhengqing Wen, Tao Peng:
Secure Data Delivery with Linear Network Coding for Multiple Multicasts with Multiple Streams in Internet of Things. 3729046:1-3729046:13 - Michal Trnka
, Tomás Cerný
, Nathaniel Stickney
:
Survey of Authentication and Authorization for the Internet of Things. 4351603:1-4351603:17 - Erxue Min
, Jun Long
, Qiang Liu
, Jianjing Cui, Wei Chen:
TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest. 4943509:1-4943509:9 - Martin Schramm
, Reiner Dojen, Michael Heigl
:
A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF(sm) Based on Montgomery Arithmetic. 4983404:1-4983404:18 - Jiameng Sun
, Binrui Zhu, Jing Qin
, Jiankun Hu
, Jixin Ma
:
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication. 5275132:1-5275132:15 - Seog Chung Seo, Taek-Young Youn
:
TLDA: An Efficient Two-Layered Data Authentication Mechanism for Content-Centric Networking. 5429798:1-5429798:17 - Ignacio Martín
, José Alberto Hernández
, Alfonso Muñoz, Antonio Guzmán:
Android Malware Characterization Using Metadata and Machine Learning Techniques. 5749481:1-5749481:11 - Youngho Park
, Chul Sur, Kyung-Hyune Rhee
:
A Secure Incentive Scheme for Vehicular Delay Tolerant Networks Using Cryptocurrency. 5932183:1-5932183:13 - Sungyong Cha
, Seungsoo Baek
, Sooyoung Kang, Seungjoo Kim
:
Security Evaluation Framework for Military IoT Devices. 6135845:1-6135845:12 - Jaewoo Shim
, Kyeonghwan Lim
, Seong-je Cho, Sangchul Han, Minkyu Park
:
Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework. 6280768:1-6280768:12 - Gicheol Wang
, Byoung-Sun Lee, Jae Young Ahn, Gihwan Cho:
A UAV-Aided Cluster Head Election Framework and Applying Such to Security-Driven Cluster Head Election Schemes: A Survey. 6475927:1-6475927:17 - Zhenyan Liu
, Yifei Zeng, Pengfei Zhang, Jingfeng Xue
, Ji Zhang, Jiangtao Liu:
An Imbalanced Malicious Domains Detection Method Based on Passive DNS Traffic Analysis. 6510381:1-6510381:7 - Yinghui Zhang
, Pengzhen Lang
, Dong Zheng
, Menglei Yang
, Rui Guo:
A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience. 7202598:1-7202598:13 - Efthimios Alepis, Constantinos Patsakis
:
Session Fingerprinting in Android via Web-to-App Intercommunication. 7352030:1-7352030:13 - Guoxiu Liu, Geng Yang
, Huaqun Wang, Yang Xiang, Hua Dai
:
A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing. 7383514:1-7383514:15 - Chao Qu, Ming Tao
, Jie Zhang, Xiaoyu Hong, Ruifen Yuan:
Blockchain Based Credibility Verification Method for IoT Entities. 7817614:1-7817614:11 - Haihua Liang
, Xinpeng Zhang, Hang Cheng, Qiuhan Wei:
Secure and Efficient Image Retrieval over Encrypted Cloud Data. 7915393:1-7915393:14 - Sahel Alouneh
, Feras Al-Hawari
, Ismail Omar Hababeh
, Gheorghita Ghinea
:
An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks. 8028960:1-8028960:10 - Ying-Ying Liu
, Yun-kai Chu:
Control Method for Sampled-Data Systems with Multiple Channels Based on Deadband-Triggered Scheme. 8165383:1-8165383:10 - Sangwon Hyun
, Junsung Cho
, Geumhwan Cho
, Hyoungshick Kim
:
Design and Analysis of Push Notification-Based Malware on Android. 8510256:1-8510256:12 - Dongwoo Kang
, Jaewook Jung
, Hyoungshick Kim
, Youngsook Lee
, Dongho Won
:
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity. 9046064:1-9046064:14 - Tong Li
, Wenbin Chen
, Yi Tang
, Hongyang Yan:
A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT. 9641273:1-9641273:6 - Blanca E. Carvajal-Gámez
, Manuel Alejandro Díaz-Casco
:
Steganography Algorithm Based on the Nonlocal Maximum Likelihood Noise Estimation for Mobile Applications. 1404826:1-1404826:29 - Xingshuo An, Fuhong Lin
, Shenggang Xu, Li Miao, Chao Gong:
A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing. 1821804:1-1821804:9 - Dinh-Chien Nguyen, Thai-Son Nguyen
, Chin-Chen Chang
, Huan-Sheng Hsueh, Fang-Rong Hsu:
High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift. 2029869:1-2029869:11 - Shuangjie Bai
, Geng Yang
, Jingqi Shi
, Guoxiu Liu, Zhaoe Min:
Privacy-Preserving Oriented Floating-Point Number Fully Homomorphic Encryption Scheme. 2363928:1-2363928:14 - Ruixiang Li
, Yuchen Sun, Jianwei Hu, Te Ma, Xiangyang Luo
:
Street-Level Landmark Evaluation Based on Nearest Routers. 2507293:1-2507293:12 - Cheng Lei
, Hongqi Zhang, Jing-Lei Tan, Yu-Chen Zhang, Xiao-Hu Liu:
Moving Target Defense Techniques: A Survey. 3759626:1-3759626:25 - Tirazheh Zare Garizy, Gilbert Fridgen
, Lars Wederhake
:
A Privacy Preserving Approach to Collaborative Systemic Risk Identification: The Use-Case of Supply Chain Networks. 3858592:1-3858592:18 - Ming Li
, Hua Ren
, En Zhang
, Wei Wang
, Lin Sun
, Di Xiao
:
A VQ-Based Joint Fingerprinting and Decryption Scheme for Secure and Efficient Image Distribution. 4313769:1-4313769:11 - Dafang Zhang
, Guojun Wang, Xin Wang, Zhengyu Li, Wenjia Li:
Cyberspace Security for Future Internet. 5313980:1 - Zhaohui Zhang
, Xinxin Zhou, Xiaobo Zhang, Lizhi Wang, Pengwei Wang
:
A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection. 5680264:1-5680264:9 - Suhri Kim, Kisoon Yoon, Jihoon Kwon
, Seokhie Hong
, Young-Ho Park
:
Efficient Isogeny Computations on Twisted Edwards Curves. 5747642:1-5747642:11 - Hao Hu
, Yuling Liu
, Hongqi Zhang, Yuchen Zhang:
Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis. 5787102:1-5787102:14 - Mohammadreza Mohammadrezaei
, Mohammad Ebrahim Shiri
, Amir Masoud Rahmani
:
Identifying Fake Accounts on Social Networks Based on Graph Analysis and Classification Algorithms. 5923156:1-5923156:8 - Zhizhu Lian
, Yupu Hu, Hu Chen, Baocang Wang
:
Bootstrapping of FHE over the Integers with Large Message Space. 6520258:1-6520258:11 - Won Park
, Youngin You
, Kyungho Lee
:
Detecting Potential Insider Threat: Analyzing Insiders' Sentiment Exposed in Social Media. 7243296:1-7243296:8 - Nawal Ait Aali
, Amine Baïna, Loubna Echabbi:
Trust Management in Collaborative Systems for Critical Infrastructure Protection. 7938727:1-7938727:15 - Jianjun Li, Jie Yu
, Lanlan Xu, Xinying Xue, Chin-Chen Chang
, Xiaoyang Mao, Junfeng Hu:
A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization. 8176984:1-8176984:13 - Salabat Khan
, Zijian Zhang
, Liehuang Zhu
, Meng Li
, Qamas Gul Khan Safi, Xiaobing Chen:
Accountable and Transparent TLS Certificate Management: An Alternate Public-Key Infrastructure with Verifiable Trusted Parties. 8527010:1-8527010:16 - Renan C. A. Alves, Doriedson A. G. Oliveira
, Geovandro C. C. F. Pereira
, Bruno C. Albertini
, Cíntia B. Margi
:
WS3N: Wireless Secure SDN-Based Communication for Sensor Networks. 8734389:1-8734389:14 - Wisam Elmasry
, Akhan Akbulut
, Abdul Halim Zaim:
Deep Learning Approaches for Predictive Masquerade Detection. 9327215:1-9327215:24 - Xin Jiang, Mingzhe Liu
, Kun Yang, Yanhua Liu, Ruili Wang:
A Security Sandbox Approach of Android Based on Hook Mechanism. 9856537:1-9856537:8 - Gandharba Swain
:
High Capacity Image Steganography Using Modified LSB Substitution and PVD against Pixel Difference Histogram Analysis. 1505896:1-1505896:14 - Yiwen Zhang, Kaibin Wang
, Yuanyuan Zhou
, Qiang He:
Enhanced Adaptive Cloudlet Placement Approach for Mobile Application on Spark. 1937670:1-1937670:12 - Mehmet Simsek:
Corrigendum to "A New Metric for Flow-Level Filtering of Low-Rate DDoS Attacks". 2083430:1-2083430:2 - Hua Dai
, Hui Ren, Zhiye Chen, Geng Yang
, Xun Yi:
Privacy-Preserving Sorting Algorithms Based on Logistic Map for Clouds. 2373545:1-2373545:10 - Ruyan Wang
, Xiaohan Meng, Yang Li
, Jian Wang:
Towards Optimized DFA Attacks on AES under Multibyte Random Fault Model. 2870475:1-2870475:9 - Nanda Kumar Thanigaivelan, Ethiopia Nigussie
, Seppo Virtanen
, Jouni Isoaho
:
Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation. 3672698:1-3672698:15 - Qassim Nasir
, Ilham A. Qasse, Manar AbuTalib, Ali Bou Nassif
:
Performance Analysis of Hyperledger Fabric Platforms. 3976093:1-3976093:14 - Marios Argyriou
, Nicola Dragoni
, Angelo Spognardi
:
Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications. 4672072:1-4672072:15 - Guanghui Liang
, Jianmin Pang
, Zheng Shan, Runqing Yang, Yihang Chen:
Automatic Benchmark Generation Framework for Malware Detection. 4947695:1-4947695:8 - Carlos Andres Lara-Nino
, Arturo Diaz-Perez
, Miguel Morales-Sandoval
:
Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN. 5087065:1-5087065:14 - Ming Wan
, Yan Song
, Yuan Jing
, Junlu Wang
:
Function-Aware Anomaly Detection Based on Wavelet Neural Network for Industrial Control Communication. 5103270:1-5103270:11 - Javier Hingant
, Marcelo Zambrano
, Francisco J. Pérez
, Israel Pérez, Manuel Esteve
:
HYBINT: A Hybrid Intelligence System for Critical Infrastructures Protection. 5625860:1-5625860:13 - Binghao Yan
, Guodong Han
:
LA-GRU: Building Combined Intrusion Detection Model Based on Imbalanced Learning and Gated Recurrent Unit Neural Network. 6026878:1-6026878:13 - Zhenxing Qian
, Kim-Kwang Raymond Choo
, Rémi Cogranne
, Xinpeng Zhang:
Multimedia Security: Novel Steganography and Privacy Preserving. 6390945:1-6390945:2 - Qingsong Zhao, Qingkai Zeng
, Ximeng Liu:
Improved Construction for Inner Product Functional Encryption. 6561418:1-6561418:12 - Guojiang Xin
, Yuling Liu
, Ting Yang, Yu Cao:
An Adaptive Audio Steganography for Covert Wireless Communication. 7096271:1-7096271:10 - Li Li, Siqin Zhou, Kim-Kwang Raymond Choo
, Xiaohong Li
, Debiao He
:
An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System. 7524102:1-7524102:11 - Chunhua Xiao
, Lei Zhang
, Yuhua Xie
, Weichen Liu
, Duo Liu
:
Hardware/Software Adaptive Cryptographic Acceleration for Big Data Processing. 7631342:1-7631342:24 - Yinghui Zhang
, Haonan Su, Menglei Yang
, Dong Zheng
, Fang Ren, Qinglan Zhao:
Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing. 9081814:1-9081814:12 - Chunqiang Yu
, Xianquan Zhang
, Zhenjun Tang
, Yan Chen, Jingyu Huang:
Reversible Data Hiding with Pixel Prediction and Additive Homomorphism for Encrypted Image. 9103418:1-9103418:13 - Nancy Agarwal
, Syed Zeeshan Hussain:
A Closer Look at Intrusion Detection System for Web Applications. 9601357:1-9601357:27 - Jungwoo Seo
, Sangjin Lee:
Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling. 9706706:1-9706706:24 - Ye Yuan
, Junting Xiao, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms. 9846168:1-9846168:14 - Yu Xue
, Weiwei Jia, Xuejian Zhao
, Wei Pang
:
An Evolutionary Computation Based Feature Selection Method for Intrusion Detection. 2492956:1-2492956:10 - Li Kuang
, Yujia Zhu
, Shuqi Li
, Xuejin Yan
, Han Yan
, Shuiguang Deng
:
A Privacy Protection Model of Data Publication Based on Game Theory. 3486529:1-3486529:13 - Gesu Li, Zhipeng Cai
, Guisheng Yin, Zaobo He, Madhuri Siddula:
Differentially Private Recommendation System Based on Community Detection in Social Network Applications. 3530123:1-3530123:18 - Pei Zhang, Wenying Zhang
:
Differential Cryptanalysis on Block Cipher Skinny with MILP Program. 3780407:1-3780407:11 - Xiaoyu Ji
, Yushi Cheng, Wenyuan Xu
, Xinyan Zhou:
User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes. 3980371:1-3980371:10 - Abdul Razaq
, Hanan A. Al-Olayan, Atta Ullah, Arshad Riaz
, Adil Waheed:
A Novel Technique for the Construction of Safe Substitution Boxes Based on Cyclic and Symmetric Groups. 4987021:1-4987021:9 - Karl Andersson
, Ilsun You
, Francesco Palmieri:
Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms. 5346596:1-5346596:2 - Dahee Choi
, Kyungho Lee
:
An Artificial Intelligence Approach to Financial Fraud Detection under IoT Environment: A Survey and Implementation. 5483472:1-5483472:15 - Haitham Elwahsh
, Mona Gamal
, A. A. Salama, Ibrahim M. El-Henawy:
A Novel Approach for Classifying MANETs Attacks with a Neutrosophic Intelligent System based on Genetic Algorithm. 5828517:1-5828517:10 - Lili Bo
, Shujuan Jiang
:
A Constraint-Aware Optimization Method for Concurrency Bug Diagnosis Service in a Distributed Cloud Environment. 6241921:1-6241921:11 - Zheng Yan
, Yuqing Zhang, Kim-Kwang Raymond Choo, Yang Xiang:
Security Measurements of Cyber Networks. 6545314:1-6545314:3 - Taehwan Park
, Hwajeong Seo
, Junsub Kim, Haeryong Park, Howon Kim
:
Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor. 7012056:1-7012056:10 - Hui Xia
, Sanshun Zhang, Benxia Li, Li Li, Xiangguo Cheng:
Towards a Novel Trust-Based Multicast Routing for VANETs. 7608198:1-7608198:12 - Jinbao Wang
, Ling Tian
, Yan Huang
, Donghua Yang
, Hong Gao:
Achieving the Optimal k-Anonymity for Content Privacy in Interactive Cyberphysical Systems. 7963163:1-7963163:15 - Jiwei Tian
, Buhong Wang, Xia Li:
Data-Driven and Low-Sparsity False Data Injection Attacks in Smart Grid. 8045909:1-8045909:11 - Khaled Riad
, Lishan Ke
:
RoughDroid: Operative Scheme for Functional Android Malware Detection. 8087303:1-8087303:10 - Yu Zheng
, Jiezhong Zhu, Wei Fang
, Lian-Hua Chi:
Deep Learning Hash for Wireless Multimedia Image Content Security. 8172725:1-8172725:13 - Yaojun Hao
, Peng Zhang, Fuzhi Zhang
:
Multiview Ensemble Method for Detecting Shilling Attacks in Collaborative Recommender Systems. 8174603:1-8174603:33 - Xiaolong Xu
, Rui Huang, Ruihan Dou, Yuancheng Li, Jie Zhang
, Tao Huang, Wenbin Yu:
Energy-Efficient Cloudlet Management for Privacy Preservation in Wireless Metropolitan Area Networks. 8180451:1-8180451:13 - Youngjoo An
, Hyang-Sook Lee, Juhee Lee, Seongan Lim
:
Key Substitution Attacks on Lattice Signature Schemes Based on SIS Problem. 8525163:1-8525163:13 - Qinlong Huang
, Yue He
, Wei Yue
, Yixian Yang:
Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption. 8932325:1-8932325:12 - Weicheng Wang
, Shengling Wang
, Jianhui Huang:
Privacy Preservation for Friend-Recommendation Applications. 1265352:1-1265352:11 - Samira Haguouche
, Zahi Jarir
:
Towards a Secure and Borderless Collaboration between Organizations: An Automated Enforcement Mechanism. 1572812:1-1572812:13 - Bing Zhang
, Zhiyang Liu
, Yanguo Jia
, Jiadong Ren, Xiaolin Zhao:
Network Intrusion Detection Method Based on PCA and Bayes Algorithm. 1914980:1-1914980:11 - Cheolhee Park
, Hyunil Kim
, Dowon Hong
, Changho Seo
:
A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments. 2193897:1-2193897:16 - Shaozhang Niu
, Ruqiang Huang
, Wenbo Chen, Yiming Xue:
An Improved Permission Management Scheme of Android Application Based on Machine Learning. 2329891:1-2329891:12 - Yunru Zhang, Min Luo
, Kim-Kwang Raymond Choo
, Debiao He
:
A General Architecture for Multiserver Authentication Key Agreement with Provable Security. 2462901:1-2462901:9 - Jingtao Li
, Yang Liu
, Wengang Pei, Zhen Cao:
Security and Communication Networks Behaviors of High-Frequency Subscribers in Cellular Data Networks. 2506319:1-2506319:12 - Yi Zhang
, Jin Sun, Zebin Wu
, Shuangyu Xie, Ruitao Xu:
Scheduling Parallel Intrusion Detecting Applications on Hybrid Clouds. 2863793:1-2863793:12 - Weizhong Qiang
, Shizhen Wang, Hai Jin
:
Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS. 3130652:1-3130652:11 - Baoyuan Kang
, Lin Si, Hong Jiang
, Chunqing Li, Mingming Xie:
ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification. 3205898:1-3205898:9 - Rutvij H. Jhaveri
, Aneri Desai, Ankit Patel
, Yubin Zhong
:
A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs. 3210207:1-3210207:13 - Weiwei Lin
, Hongwei Zeng, Honghao Gao
, Huaikou Miao
, Xiaolin Wang
:
Test Sequence Reduction of Wireless Protocol Conformance Testing to Internet of Things. 3723691:1-3723691:13 - Qilong Han, Zuobin Xiong
, Kejia Zhang
:
Research on Trajectory Data Releasing Method via Differential Privacy Based on Spatial Partition. 4248092:1-4248092:14 - Octavio Flores Siordia
, Juan Carlos Estrada Gutiérrez, Carlos Eduardo Padilla Leyferman, Jorge Aguilar Santiago
, Maricela Jiménez Rodríguez
:
System to Safeguard the Identity of Persons in Photographs through Cryptography and Steganography Techniques Using Chaos. 4853134:1-4853134:16 - Riccardo Pecori
, Luca Veltri
:
A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord. 4963932:1-4963932:16 - Liming Fang, Liang Liu
, Jinyue Xia, Maosheng Sun:
A Secure Multimedia Data Sharing Scheme for Wireless Network. 5037892:1-5037892:10 - Jieren Cheng
, Chen Zhang
, Xiangyan Tang, Victor S. Sheng
, Zhe Dong, Junqi Li:
Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning. 5198685:1-5198685:19 - Zhen Zhang, Yibing Li, Chao Wang, Meiyu Wang, Ya Tu, Jin Wang
:
An Ensemble Learning Method for Wireless Multimedia Device Identification. 5264526:1-5264526:9 - Xin Wang, Bo Yang
, Zhe Xia, Yanqi Zhao, Huifang Yu
:
A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing. 6174830:1-6174830:13 - Muhammad Bilal
, Muhammad Asif
, Abid Bashir
:
Assessment of Secure OpenID-Based DAAA Protocol for Avoiding Session Hijacking in Web Applications. 6315039:1-6315039:10 - Chunpeng Ge
, Jinyue Xia, Aaron Wu, Hongwei Li, Yao Wang:
A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network. 6395362:1-6395362:8 - Ugur Coruh
, Oguz Bayat:
Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks. 6563089:1-6563089:25 - Imen Nouioua
, Nouredine Amardjia, Sarra Belilita:
A Novel Blind and Robust Video Watermarking Technique in Fast Motion Frames Based on SVD and MR-SVD. 6712065:1-6712065:17 - Jinquan Zhang, Yanfeng Yuan, Xiao Wang, Lina Ni
, Jiguo Yu
, Mengmeng Zhang:
RPAR: Location Privacy Preserving via Repartitioning Anonymous Region in Mobile Social Network. 6829326:1-6829326:10 - Youwen Zhu, Yue Zhang, Jiabin Yuan, Xianmin Wang
:
FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things. 6909703:1-6909703:9 - Zhaozheng Li
, Weimin Lei
, Wei Zhang, KwangHyok Jo:
A Relative Phase Based Audio Integrity Protection Method: Model and Strategy. 7139391:1-7139391:11 - Haosu Cheng, Jianwei Liu
, Jian Mao
, Mengmeng Wang, Jie Chen, Jingdong Bian:
A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN. 8392080:1-8392080:20 - Guodong Ye
, Kaixin Jiao, Chen Pan, Xiaoling Huang
:
An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map. 8402578:1-8402578:11 - Jiguo Li
, Shengzhou Hu, Yichen Zhang:
Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key. 8738960:1-8738960:10 - Xiaolong Liu
, Qiang Wei
, Qingxian Wang, Zheng Zhao
, Zhongxu Yin:
CAFA: A Checksum-Aware Fuzzing Assistant Tool for Coverage Improvement. 9071065:1-9071065:13 - Ke Yin
:
A Study on Effectiveness Evaluation for the Physical Protection System of a High Security Prison Based on the Cloud Model. 9583982:1-9583982:9 - Rahul Saha
, G. Geetha, Gulshan Kumar
, Tai-Hoon Kim:
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys. 9802475:1-9802475:11 - Zied Kricha
, Anis Kricha, Anis Sakly:
A Robust Watermarking Scheme Based on the Mean Modulation of DWT Coefficients. 1254081:1-1254081:16 - Zhenghong Wang
, Zhangjie Fu
, Xingming Sun
:
Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud. 1420930:1-1420930:10 - Sitalakshmi Venkatraman
, Mamoun Alazab
:
Use of Data Visualisation for Zero-Day Malware Detection. 1728303:1-1728303:13 - Kholoud Al-Saleh, Abdelfettah Belghith
:
Practical Suitability and Experimental Assessment of Tree ORAMs. 2138147:1-2138147:15 - Xiling Luo, Zequan Zhou, Lin Zhong, Jian Mao
, Chaoyong Chen:
An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature. 2615249:1-2615249:11 - Kiseon Kim
, Jalel Ben-Othman, Prem Mahalik:
Covert Communication Networks in Hostile Environments. 2731859:1-2731859:2 - Thanh Hong Nguyen
, Mason Wright, Michael P. Wellman
, Satinder Singh:
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis. 2864873:1-2864873:28 - Naveed Ahmed Azam
, Umar Hayat
, Ikram Ullah
:
An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization. 3421725:1-3421725:9 - Mirsat Yesiltepe
, Muhammet Kurulay
:
Fake and Real Massaging at the Same Time with QR Code in Web Services for Different Users. 3809462:1-3809462:10 - Iqtadar Hussain
, Fawad Ahmed, Umar Mujahid Khokhar, Amir Anees
:
Applied Cryptography and Noise Resistant Data Security. 3962821:1-3962821:2 - Longdan Tan, Kesheng Liu, Xuehu Yan
, Lintao Liu, Tianqi Lu, Jinrui Chen, Feng Liu
, Yuliang Lu:
Robust Visual Secret Sharing Scheme Applying to QR Code. 4036815:1-4036815:12 - Weiwei Liu
, Guangjie Liu
, Yang Xia, Xiaopeng Ji, Jiangtao Zhai
, Yuewei Dai:
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking. 5051270:1-5051270:16 - Hong Wang
, Jianhua Li, Feng Zhu, Zhe Wang:
Asynchronous Group Authentication Based on Geometric Approach. 5289383:1-5289383:9 - Jian Song
, Guangsong Li
, Bo-ru Xu, Chuangui Ma:
A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service. 5432960:1-5432960:13 - Zhendong Wu
, Jiajia Yang, Jianwu Zhang, Hengli Yue:
Multibiometric Fusion Authentication in Wireless Multimedia Environment Using Dynamic Bayesian Method. 5783976:1-5783976:12 - Tan N. Nguyen
, Minh Tran
, Phuong T. Tran
, Phu Tran Tin
, Thanh-Long Nguyen
, Duy-Hung Ha
, Miroslav Voznák
:
On the Performance of Power Splitting Energy Harvested Wireless Full-Duplex Relaying Network with Imperfect CSI over Dissimilar Channels. 6036087:1-6036087:11 - Minhye Seo
, Jong Hwan Park
, Youngsam Kim
, Sangrae Cho, Dong Hoon Lee
, Jung Yeon Hwang
:
Construction of a New Biometric-Based Key Derivation Function and Its Application. 6107912:1-6107912:14 - Xiaodan Gu, Ming Yang
, Yiting Zhang, Peilong Pan, Zhen Ling
:
Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment. 6124160:1-6124160:15 - Jieren Cheng
, Mengyang Li
, Xiangyan Tang, Victor S. Sheng
, Yifu Liu
, Wei Guo
:
Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing. 6459326:1-6459326:14 - Xinyi Hu
, Yaqun Zhao:
Research on Plaintext Restoration of AES Based on Neural Network. 6868506:1-6868506:9 - Chen Li, Yecai Guo
, Qi Liu, Xiaodong Liu:
DR-Net: A Novel Generative Adversarial Network for Single Image Deraining. 7350324:1-7350324:14 - Inwoo Ro, Joong Soo Han, Eul Gyu Im
:
Detection Method for Distributed Web-Crawlers: A Long-Tail Threshold Model. 9065424:1-9065424:7 - Dan Yin
, Qing Yang
:
GANs Based Density Distribution Privacy-Preservation on Mobility Data. 9203076:1-9203076:13 - Pablo Salva-Garcia
, José M. Alcaraz Calero
, Qi Wang
, Jorge Bernal Bernabé
, Antonio F. Skarmeta
:
5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks. 9291506:1-9291506:21 - Huifang Yu
, Zhicang Wang, Jianmin Li, Xinzhe Gao:
Identity-Based Proxy Signcryption Protocol with Universal Composability. 9531784:1-9531784:11 - Xuefei Liu, Chao Zhang
, Pingzeng Liu, Maoling Yan, Baojia Wang, Jianyong Zhang, Russell Higgs
:
Application of Temperature Prediction Based on Neural Network in Intrusion Detection of IoT. 1635081:1-1635081:10 - Weizhong Qiang
, Shizhen Wang, Hai Jin
, Jiangying Zhong
:
Corrigendum to "Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS". 5618453:1 - Xiufeng Zhao
, Hefeng Mao, Shuai Liu, Weitao Song, Bo Zhang
:
Analysis on Matrix GSW-FHE and Optimizing Bootstrapping. 6362010:1-6362010:9 - Xun Wang
, Tao Luo
, Jianfeng Li:
A More Efficient Fully Homomorphic Encryption Scheme Based on GSW and DM Schemes. 8706940:1-8706940:14 - Rafal Kozik
, Marek Pawlicki
, Michal Choras:
Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection. 8753870:1-8753870:8 - Guilherme Oliveira
, Evelio M. G. Fernández
, Samuel Baraldi Mafra, Samuel Montejo Sánchez
, Cesar A. Azurdia-Meza:
Optimal Improper Gaussian Signaling for Physical Layer Security in Cognitive Radio Networks. 9065856:1-9065856:13 - Xiufeng Zhao
, Ailan Wang:
Generalized Bootstrapping Technique Based on Block Equality Test Algorithm. 9325082:1-9325082:8 - Duc-Minh Ngo
, Cuong Pham-Quoc
, Tran Ngoc Thinh:
An Efficient High-Throughput and Low-Latency SYN Flood Defender for High-Speed Networks. 9562801:1-9562801:14

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.