Search

Your search keyword '"68M25"' showing total 157 results

Search Constraints

Start Over You searched for: Descriptor "68M25" Remove constraint Descriptor: "68M25"
157 results on '"68M25"'

Search Results

1. Minimizing the Number of Roles in Bottom-Up Role-Mining using Maximal Biclique Enumeration

2. Expanding the Attack Scenarios of SAE J1939: A Comprehensive Analysis of Established and Novel Vulnerabilities in Transport Protocol

3. VeriFence: Lightweight and Precise Spectre Defenses for Untrusted Linux Kernel Extensions

4. PhenoAuth: A Novel PUF-Phenotype-based Authentication Protocol for IoT Devices

5. Attacking Delay-based PUFs with Minimal Adversary Model

6. Integrating Multi -WAN, VPN and IEEE 802.3ad for Advanced IPSEC

7. The Adobe Hidden Feature and its Impact on Sensor Attribution

8. A Survey on Property-Preserving Database Encryption Techniques in the Cloud

9. DiCE -- A Data Encryption Proxy for the Cloud

10. Execution at RISC: Stealth JOP Attacks on RISC-V Applications

11. Decisions & Disruptions 2: Decide Harder

12. The Effect of Length on Key Fingerprint Verification Security and Usability

13. Device-Bind Key-Storageless Hardware AI Model IP Protection: A PUF and Permute-Diffusion Encryption-Enabled Approach

14. From Malware Samples to Fractal Images: A New Paradigm for Classification. (Version 2.0, Previous version paper name: Have you ever seen malware?)

15. Control-Flow Integrity at RISC: Attacking RISC-V by Jump-Oriented Programming

16. The Inconvenient Truths of Ground Truth for Binary Analysis

18. Secret sharing based RFID protocol using ECC for TMIS.

19. ROI: a method for identifying organizations receiving personal data.

20. PACSan: Enforcing Memory Safety Based on ARM PA

21. Securing Federated Sensitive Topic Classification against Poisoning Attacks

22. Polytope: Practical Memory Access Control for C++ Applications

23. Clustering versus Statistical Analysis for SCA: when Machine Learning is Better

24. Horizontal SCA Attacks against kP Algorithm Using K-Means and PCA

26. Forensic Issues and Techniques to Improve Security in SSD with Flex Capacity Feature

27. Quantifying Cybersecurity Effectiveness of Software Diversity

28. HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles

29. RFID Exploitation and Countermeasures

30. Cryptanalyzing two image encryption algorithms based on a first-order time-delay system

32. Performance and Usability of Visual and Verbal Verification of Word-based Key Fingerprints

33. Multidimensional Byzantine Agreement in a Synchronous Setting

34. Confidence Assertions in Cyber-Security for an Information-Sharing Environment

35. Attacks on a Privacy-Preserving Publish-Subscribe System and a Ride-Hailing Service

36. Accept All: The Landscape of Cookie Banners in Greece and the UK

37. Automating the GDPR Compliance Assessment for Cross-border Personal Data Transfers in Android Applications

38. Few-Shot Website Fingerprinting Attack

39. Interconnection between darknets

40. Knowledge-Base Practicality for Cybersecurity Research Ethics Evaluation

41. Improving Interdisciplinary Communication With Standardized Cyber Security Terminology: A Literature Review

42. Towards a better similarity algorithm for host-based intrusion detection system

43. Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools

44. Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code

45. Hermes Attack: Steal DNN Models with Lossless Inference Accuracy

46. A Distributed Trust Framework for Privacy-Preserving Machine Learning

47. Revisiting Security Vulnerabilities in Commercial Password Managers

48. Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice.

49. Graph signal processing and tunicate swarm optimization based image steganography using hybrid chaotic map based image scrambling.

50. Review on security issues and solutions in cloud computing.

Catalog

Books, media, physical & digital resources