Search

Showing total 13,635 results

Search Constraints

Start Over You searched for: Topic cryptography and security (cs.cr) Remove constraint Topic: cryptography and security (cs.cr)
13,635 results

Search Results

201. MINER: A Hybrid Data-Driven Approach for REST API Fuzzing

202. Differential Aggregation against General Colluding Attackers

203. A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection

204. Evaluation Methodologies in Software Protection Research

205. Bitcoin's Carbon Footprint Revisited: Proof of Work Mining for Renewable Energy Expansion

206. Location Privacy Protection Game against Adversary through Multi-user Cooperative Obfuscation

207. New Approach to Malware Detection Using Optimized Convolutional Neural Network

208. Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks

209. Learning across Data Owners with Joint Differential Privacy

210. OblivIO: Securing reactive programs by oblivious execution with bounded traffic overheads

211. Cross Chain Bribery Contracts: Majority vs Mighty Minority

212. UAV Trajectory and Multi-User Beamforming Optimization for Clustered Users Against Passive Eavesdropping Attacks With Unknown CSI

213. Improving Transferability of Adversarial Examples via Bayesian Attacks

214. How Effective Are Neural Networks for Fixing Security Vulnerabilities

215. SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection

216. PMFault: Faulting and Bricking Server CPUs through Management Interfaces

217. Backdoor Attacks to Pre-trained Unified Foundation Models

218. Anomaly Detection Dataset for Industrial Control Systems

219. Personalized Privacy Auditing and Optimization at Test Time

220. Less is More: Revisiting Gaussian Mechanism for Differential Privacy

221. Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs

222. BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects

223. Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning

224. ACM with Overlapping Partitions: Implementation and Periodicity Analysis

225. Analysis of the Benefits and Efficacy of the Addition of Variants and Reality Paths to the Blackboard Architecture

226. Review, Meta-Taxonomy, and Use Cases of Cyberattack Taxonomies of Manufacturing Cybersecurity Threat Attributes and Countermeasures

227. Residual-Based Detection of Attacks in Cyber-Physical Inverter-Based Microgrids

228. High-Performance Caching of Homomorphic Encryption for Cloud Databases

229. Secure Composition of Robust and Optimising Compilers

230. TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors (Technical Report)

231. An Insider Threat Mitigation Framework Using Attribute Based Access Control

232. ChatGPT for Digital Forensic Investigation: The Good, The Bad, and The Unknown

233. An electronic warfare approach for deploying a software-based Wi-Fi jammer

234. StyleID: Identity Disentanglement for Anonymizing Faces

235. Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software

236. On Cache-Aided Multi-User Private Information Retrieval with Small Caches

237. Scalable and Secure Row-Swap: Efficient and Safe Row Hammer Mitigation in Memory Systems

238. Federated Learning Attacks Revisited: A Critical Discussion of Gaps, Assumptions, and Evaluation Setups

239. A comparison, analysis, and provision of methods in identifying types of malware and means of malware detection and protection against them

240. Pedagogic Challenges in Teaching Cyber Security -- a UK Perspective

241. Digital Twins for Dynamic Management of Blockchain Systems

242. Fast, Cheap and Good: Lightweight Methods Are Undervalued

243. A Novel Efficient Signcryption Scheme for Resource-Constrained Smart Terminals in Cyber-Physical Power Systems

244. Systematic review of automatic translation of high-level security policy into firewall rules

245. The Future of Integrated Digital Governance in the EU: EBSI and GLASS

246. On Zero-Knowledge Proofs over the Quantum Internet

247. Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System

248. Attack-aware Synchronization-free Data Timestamping in LoRaWAN

249. Comparative Analysis and Enhancement of CFG-based Hardware-Assisted CFI Schemes

250. Statistical inference attack against PHY-layer key extraction and countermeasures