Search

Showing total 349 results
349 results

Search Results

1. Extending the classical side-channel analysis framework to access-driven cache attacks

2. A survey on the (in)security of trusted execution environments

3. Full-stack vulnerability analysis of the cloud-native platform

4. CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication

5. A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS

6. DroidRL: Feature selection for android malware detection with reinforcement learning

7. AIDTF: Adversarial training framework for network intrusion detection

8. Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art

9. SoK: Run-time security for cloud microservices. Are we there yet?

10. A comprehensive study of DDoS attacks over IoT network and their countermeasures

11. Distributed query execution under access restrictions

12. Understanding situation awareness in SOCs, a systematic literature review

13. Evaluation of Asian Countries using Data Center Security Index: A Spherical Fuzzy AHP-based EDAS Approach

14. Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments

15. Web-tracking compliance: websites' level of confidence in the use of information-gathering technologies

16. A Taxonomy for Threat Actors' Persistence Techniques

17. Comparative research on network intrusion detection methods based on machine learning

18. Investigating perceptions about risk of data breaches in financial institutions: A routine activity-approach

19. KRTunnel: DNS channel detector for mobile devices

20. An empirical study of vulnerability discovery methods over the past ten years

21. Uncovering APT malware traffic using deep learning combined with time sequence and association analysis

22. An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity

23. MMM-RF: A novel high accuracy multinomial mixture model for network intrusion detection systems

24. Reducing Ransomware Crime: Analysis of Victims' Payment Decisions

25. Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise

26. DIFCS: A Secure Cloud Data Sharing Approach Based on Decentralized Information Flow Control

27. FeSA: Feature selection architecture for ransomware detection under concept drift

28. Birds of a feather: Collective privacy of online social activist groups

29. Orchestration of APT malware evasive manoeuvers employed for eluding anti-virus and sandbox defense

30. Situational Crime Prevention (SCP) techniques to prevent and control cybercrimes: A focused systematic review

31. A comprehensive deep learning benchmark for IoT IDS

32. A Feature-driven Method for Automating the Assessment of OSINT Cyber Threat Sources

33. Enhanced MANET security using artificial immune system based danger theory to detect selfish nodes

34. Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study

35. A Survey Of differential privacy-based techniques and their applicability to location-Based services

36. Cyber-enabled burglary of smart homes

37. Non-Interactive and secure outsourcing of PCA-Based face recognition

38. A novel framework for image-based malware detection with a deep neural network

39. Rationality constraints in cyber defense: Incident handling, attribution and cyber threat intelligence

40. A survey on security attacks and defense techniques for connected and autonomous vehicles

41. Digestive neural networks: A novel defense strategy against inference attacks in federated learning

42. Microscopic printing analysis and application for classification of source printer

43. Review of cybersecurity assessment methods: Applicability perspective

44. Differential area analysis for ransomware attack detection within mixed file datasets

45. An approach to detect user behaviour anomalies within identity federations

46. Three decades of deception techniques in active cyber defense - Retrospect and outlook

47. A new WAF architecture with machine learning for resource-efficient use

48. Challenges and pitfalls in malware research

49. Tor forensics: Proposed workflow for client memory artefacts

50. GDroid: Android malware detection and classification with graph convolutional network