Works matching IS 25233246 AND DT 2025 AND VI 8 AND IP 1
Results: 14
The secret behind instant messaging: video identification attack against complex protocols: The secret behind Instant Messaging...: R. Huang et al.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00300-1
- By:
- Publication type:
- Article
Zero-trust based dynamic access control for cloud computing.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00320-x
- By:
- Publication type:
- Article
Deep neural network modeling attacks on arbiter-PUF-based designs.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00308-7
- By:
- Publication type:
- Article
Speedup signing: pre-rejection sampling towards dilithium.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00325-6
- By:
- Publication type:
- Article
When LLMs meet cybersecurity: a systematic literature review.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-025-00361-w
- By:
- Publication type:
- Article
Detection to false data for smart grid.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00326-5
- By:
- Publication type:
- Article
A novel oversampling method based on Wasserstein CGAN for imbalanced classification.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00290-0
- By:
- Publication type:
- Article
A privacy-enhanced framework with deep learning for botnet detection.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00307-8
- By:
- Publication type:
- Article
Reusable and robust fuzzy extractor for CRS-dependent sources.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00294-w
- By:
- Publication type:
- Article
Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00312-x
- By:
- Publication type:
- Article
Angus: efficient active learning strategies for provenance based intrusion detection.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00311-y
- By:
- Publication type:
- Article
Privacy-preserving attribute-based access control using homomorphic encryption.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00323-8
- By:
- Publication type:
- Article
The SEIRS-NIMFA epidemiological model for malware propagation analysis in IoT networks: The SEIRS-NIMFA epidemiological...: L. Quiroga-Sánchez et al.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00310-z
- By:
- Publication type:
- Article
A graph backdoor detection method for data collection scenarios.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00305-w
- By:
- Publication type:
- Article