default search action
Cybersecurity, Volume 2
Volume 2, Number 1, December 2019
- Xiayang Wang, Fuqian Huang, Haibo Chen:
DTrace: fine-grained and efficient data integrity checking with hardware instruction tracing. 1 - Manar Alohaly, Hassan Takabi, Eduardo Blanco:
Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies. 2 - Pietro Colombo, Elena Ferrari:
Access control technologies for Big Data management systems: literature review and future trends. 3 - Kanchana Devi V., Ganesan R.:
Semi Markov process inspired selfish aware co-operative scheme for wireless sensor networks (SMPISCS). 4 - Chaoqun Ma, Xiaolin Kong, Qiujun Lan, Zhongding Zhou:
The privacy protection mechanism of Hyperledger Fabric and its application in supply chain finance. 5 - Charles Morisset, Tim A. C. Willemse, Nicola Zannone:
A framework for the extended evaluation of ABAC policies. 6 - Qingfeng Chen, Xu Zhang, Ruchang Zhang:
Privacy-preserving decision tree for epistasis detection. 7 - Naveen Kumar, Anish Mathuria:
Comprehensive evaluation of key management hierarchies for outsourced data. 8 - Shengye Wan, Yue Li, Kun Sun:
PathMarker: protecting web contents against inside crawlers. 9 - Noora Hashim Alallaq, Muhmmad Al-Khiza'ay, Xin Han:
Group topic-author model for efficient discovery of latent social astroturfing groups in tourism domain. 10 - Tong Chen, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Zhen Han:
Adversarial attack and defense in reinforcement learning-from AI security view. 11 - Yan Wang, Wei Wu, Chao Zhang, Xinyu Xing, Xiaorui Gong, Wei Zou:
From proof-of-concept to exploitable. 12 - Zhihao Wang, Hong Li, Qiang Li, Wei Li, Hongsong Zhu, Limin Sun:
Towards IP geolocation with intermediate routers based on topology discovery. 13 - Simon Parkinson, Saad Khan, James Bray, Daiyaan Shreef:
Creeper: a tool for detecting permission creep in file system access controls. 14 - Ahmet Okutan, Shanchieh Jay Yang:
ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense. 15 - Li Yang, Hua Dong, Zhao Li:
One-way information reconciliation schemes of quantum key distribution. 16 - Wenjie Li, Dongpeng Xu, Wei Wu, Xiaorui Gong, Xiaobo Xiang, Yan Wang, Fangming Gu, Qianxiang Zeng:
Memory access integrity: detecting fine-grained memory access errors in binary code. 17 - Yanyan Liu, Daode Zhang, Yi Deng, Bao Li:
(Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy. 18 - Marco Benedetti, Marco Mori:
On the use of Max-SAT and PDDL in RBAC maintenance. 19 - Ansam Khraisat, Iqbal Gondal, Peter Vamplew, Joarder Kamruzzaman:
Survey of intrusion detection systems: techniques, datasets and challenges. 20 - Yiru Sun, Yanyan Liu, Bo Wu:
An efficient full dynamic group signature scheme over ring. 21 - Yuejun Liu, Rui Zhang, Yongbin Zhou:
Predicate encryption against master-key tampering attacks. 22 - Manfred Vielberth, Florian Menges, Günther Pernul:
Human-as-a-security-sensor for harvesting threat intelligence. 23
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.