Sign in
Cybersecur.
2018
2020
2022
2024
2018
2024
Keyphrases
Publications
volume 7, number 1, 2024
Md. Alamgir Hossain
,
Md. Saiful Islam
Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity.
Cybersecur.
7 (1) (2024)
Keya Xu
,
Guang Cheng
F3l: an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android.
Cybersecur.
7 (1) (2024)
Yanjun Li
,
Weiguo Zhang
,
Yiping Lin
,
Jian Zou
,
Jian Liu
A circuit area optimization of MK-3 S-box.
Cybersecur.
7 (1) (2024)
Shuang Song
,
Neng Gao
,
Yifei Zhang
,
Cunqing Ma
BRITD: behavior rhythm insider threat detection with time awareness and user adaptation.
Cybersecur.
7 (1) (2024)
volume 6, number 1, 2023
Baolong Jin
,
Rui Xue
Improved lower bound for the complexity of unique shortest vector problem.
Cybersecur.
6 (1) (2023)
Chaidir Chalaf Islamy
,
Tohari Ahmad
,
Royyana Muslim Ijtihadie
Reversible data hiding based on histogram and prediction error for sharing secret data.
Cybersecur.
6 (1) (2023)
Zishuai Song
,
Hui Ma
,
Shuzhou Sun
,
Yansen Xin
,
Rui Zhang
Rainbow: reliable personally identifiable information retrieval across multi-cloud.
Cybersecur.
6 (1) (2023)
Davide Berardi
,
Nils Ole Tippenhauer
,
Andrea Melis
,
Marco Prandini
,
Franco Callegati
Time sensitive networking security: issues of precision time protocol and its implementation.
Cybersecur.
6 (1) (2023)
Yu Wei
,
Lei Bi
,
Xianhui Lu
,
Kunpeng Wang
Security estimation of LWE via BKW algorithms.
Cybersecur.
6 (1) (2023)
Anit Kumar Ghosal
,
Dipanwita Roychowdhury
Continuously non-malleable codes from block ciphers in split-state model.
Cybersecur.
6 (1) (2023)
Rubayyi Alghamdi
,
Martine Bellaïche
An ensemble deep learning based IDS for IoT using Lambda architecture.
Cybersecur.
6 (1) (2023)
Chuyi Yan
,
Chen Zhang
,
Meng Shen
,
Ning Li
,
Jinhao Liu
,
Yinhao Qi
,
Zhigang Lu
,
Yuling Liu
Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk.
Cybersecur.
6 (1) (2023)
Jiashuo Liu
,
Jiongjiong Ren
,
Shaozhen Chen
A deep learning aided differential distinguisher improvement framework with more lightweight and universality.
Cybersecur.
6 (1) (2023)
Yisroel Mirsky
IPatch: a remote adversarial patch.
Cybersecur.
6 (1) (2023)
Sea Ran Cleon Liew
,
Ngai-Fong Law
Use of subword tokenization for domain generation algorithm classification.
Cybersecur.
6 (1) (2023)
Wen Wang
,
Jianhua Wang
,
Xiaofeng Peng
,
Ye Yang
,
Chun Xiao
,
Shuai Yang
,
Mingcai Wang
,
Lingfei Wang
,
Lin Li
,
Xiaolin Chang
Exploring best-matched embedding model and classifier for charging-pile fault diagnosis.
Cybersecur.
6 (1) (2023)
Zonghao Ying
,
Bin Wu
DLP: towards active defense against backdoor attacks with decoupled learning process.
Cybersecur.
6 (1) (2023)
Hashida Haidros Rahima Manzil
,
S. Manohar Naik
Android malware category detection using a novel feature vector-based machine learning model.
Cybersecur.
6 (1) (2023)
Vaishnavi Sivagaminathan
,
Manmohan Sharma
,
Santosh Kumar Henge
Intrusion detection systems for wireless sensor networks using computational intelligence techniques.
Cybersecur.
6 (1) (2023)
Huashuang Yang
,
Jinqiao Shi
,
Yue Gao
,
Xuebin Wang
,
Yanwei Sun
,
Ruisheng Shi
,
Dongbin Wang
Evicting and filling attack for linking multiple network addresses of Bitcoin nodes.
Cybersecur.
6 (1) (2023)
Jianjun Zhao
,
Can Yang
,
Di Wu
,
Yaqin Cao
,
Yuling Liu
,
Xiang Cui
,
Qixu Liu
Detecting compromised email accounts via login behavior characterization.
Cybersecur.
6 (1) (2023)
Weihao Huang
,
Guozhu Meng
,
Chaoyang Lin
,
Qiucun Yan
,
Kai Chen
,
Zhuo Ma
Are our clone detectors good enough? An empirical study of code effects by obfuscation.
Cybersecur.
6 (1) (2023)
Feng Guo
,
Zheng Sun
,
Yuxuan Chen
,
Lei Ju
Towards the universal defense for query-based audio adversarial attacks on speech recognition system.
Cybersecur.
6 (1) (2023)
María-Dolores Cano
,
Antonio Villafranca
,
Igor Tasic
Performance evaluation of Cuckoo filters as an enhancement tool for password cracking.
Cybersecur.
6 (1) (2023)
Chengbin Jin
,
Yongbin Zhou
Enhancing non-profiled side-channel attacks by time-frequency analysis.
Cybersecur.
6 (1) (2023)
Haizhou Wang
,
Anoop Singhal
,
Peng Liu
Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detection.
Cybersecur.
6 (1) (2023)
Yanyan Zou
,
Wei Zou
,
JiaCheng Zhao
,
Nanyu Zhong
,
Yu Zhang
,
Ji Shi
,
Wei Huo
PosFuzz: augmenting greybox fuzzing with effective position distribution.
Cybersecur.
6 (1) (2023)
B. S. Sharmila
,
Rohini Nagapadma
Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset.
Cybersecur.
6 (1) (2023)
Yuyao Ge
,
Zhongguo Yang
,
Lizhe Chen
,
Yiming Wang
,
Chengyang Li
Attack based on data: a novel perspective to attack sensitive points directly.
Cybersecur.
6 (1) (2023)
Jean De La Croix Ntivuguruzwa
,
Tohari Ahmad
A convolutional neural network to detect possible hidden data in spatial domain images.
Cybersecur.
6 (1) (2023)
Yixuan Cheng
,
Wenqing Fan
,
Wei Huang
,
Jingyu Yang
,
Gaoqing Yu
,
Wen Liu
MSLFuzzer: black-box fuzzing of SOHO router devices via message segment list inference.
Cybersecur.
6 (1) (2023)
Chang Liu
,
Yan-Jun Wu
,
Jing-Zheng Wu
,
Chen Zhao
A buffer overflow detection and defense method based on RISC-V instruction set extension.
Cybersecur.
6 (1) (2023)
Fei Tang
,
Shikai Liang
,
Guowei Ling
,
Jinyong Shan
IHVFL: a privacy-enhanced intention-hiding vertical federated learning framework for medical data.
Cybersecur.
6 (1) (2023)
Armita Kazeminajafabadi
,
Mahdi Imani
Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs.
Cybersecur.
6 (1) (2023)
Muhammad Usama Sardar
,
Christof Fetzer
Confidential computing and related technologies: a critical review.
Cybersecur.
6 (1) (2023)
Hasan Torabi
,
Seyedeh Leili Mirtaheri
,
Sergio Greco
Practical autoencoder based anomaly detection by using vector reconstruction error.
Cybersecur.
6 (1) (2023)
Yi Yang
,
Ying Li
,
Kai Chen
,
Jinghua Liu
Jeu de mots paronomasia: a StackOverflow-driven bug discovery approach.
Cybersecur.
6 (1) (2023)
Qi Zhang
,
Zhixiang Liang
,
Shujuan Ji
,
Benyong Xing
,
Dickson K. W. Chiu
Detecting fake reviewers in heterogeneous networks of buyers and sellers: a collaborative training-based spammer group algorithm.
Cybersecur.
6 (1) (2023)
Yubing Jiang
,
Peisong Shen
,
Li Zeng
,
Xiaojie Zhu
,
Di Jiang
,
Chi Chen
Cancelable biometric schemes for Euclidean metric and Cosine metric.
Cybersecur.
6 (1) (2023)
Chao Chen
,
Fangguo Zhang
Verifiable delay functions and delay encryptions from hyperelliptic curves.
Cybersecur.
6 (1) (2023)
Kaisheng Fan
,
Weizhe Zhang
,
Guangrui Liu
,
Hui He
FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems.
Cybersecur.
6 (1) (2023)
Vikas Maurya
,
Rachit Agarwal
,
Saurabh Kumar
,
Sandeep K. Shukla
EPASAD: ellipsoid decision boundary based Process-Aware Stealthy Attack Detector.
Cybersecur.
6 (1) (2023)
Ziad Hussein
,
May A. Salama
,
Sahar A. El-Rahman
Evolution of blockchain consensus algorithms: a review on the latest milestones of blockchain consensus algorithms.
Cybersecur.
6 (1) (2023)
Jun Cui
,
Changqi Huang
,
Huan Meng
,
Ran Wei
Tor network anonymity evaluation based on node anonymity.
Cybersecur.
6 (1) (2023)
Jiaxi Liu
,
Yun Feng
,
Xinyu Liu
,
Jianjun Zhao
,
Qixu Liu
MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network.
Cybersecur.
6 (1) (2023)
Xiaobo Xiang
,
Yue Jiang
,
Qingli Guo
,
Xiu Zhang
,
Xiaorui Gong
,
Baoxu Liu
AppChainer: investigating the chainability among payloads in android applications.
Cybersecur.
6 (1) (2023)
Zonghao Ying
,
Bin Wu
NBA: defensive distillation for backdoor removal via neural behavior alignment.
Cybersecur.
6 (1) (2023)
Sohel Rana
,
M. Rubaiyat Hossain Mondal
,
Joarder Kamruzzaman
RBFK cipher: a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment.
Cybersecur.
6 (1) (2023)
David Concejal Muñoz
,
Antonio del Corte-Valiente
A novel botnet attack detection for IoT networks based on communication graphs.
Cybersecur.
6 (1) (2023)
Peng Liu
,
Wenzhe Ye
,
Haiying Duan
,
Xianxian Li
,
Shuyi Zhang
,
Chuanjian Yao
,
Yongnan Li
Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities.
Cybersecur.
6 (1) (2023)