Found: 25
Select item for more details and to access through your institution.
Error reduction of SRAM-based physically unclonable function for chip authentication.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1087, doi. 10.1007/s10207-023-00668-0
- By:
- Publication type:
- Article
Real-time detection of deception attacks in cyber-physical systems.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1099, doi. 10.1007/s10207-023-00677-z
- By:
- Publication type:
- Article
SFCGDroid: android malware detection based on sensitive function call graph.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1115, doi. 10.1007/s10207-023-00679-x
- By:
- Publication type:
- Article
A systematic literature review for network intrusion detection system (IDS).
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1125, doi. 10.1007/s10207-023-00682-2
- By:
- Publication type:
- Article
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1163, doi. 10.1007/s10207-023-00683-1
- By:
- Publication type:
- Article
A novel hybrid hunger games algorithm for intrusion detection systems based on nonlinear regression modeling.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1177, doi. 10.1007/s10207-023-00684-0
- By:
- Publication type:
- Article
Protection of centralized SDN control plane from high-rate Packet-In messages.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1197, doi. 10.1007/s10207-023-00685-z
- By:
- Publication type:
- Article
Malicious website identification using design attribute learning.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1207, doi. 10.1007/s10207-023-00686-y
- By:
- Publication type:
- Article
A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1219, doi. 10.1007/s10207-023-00687-x
- By:
- Publication type:
- Article
Analyzing and comparing the security of self-sovereign identity management systems through threat modeling.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1231, doi. 10.1007/s10207-023-00688-w
- By:
- Publication type:
- Article
An interpretability security framework for intelligent decision support systems based on saliency map.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1249, doi. 10.1007/s10207-023-00689-9
- By:
- Publication type:
- Article
Secure access privilege delegation using attribute-based encryption.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1261, doi. 10.1007/s10207-023-00690-2
- By:
- Publication type:
- Article
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1277, doi. 10.1007/s10207-023-00691-1
- By:
- Publication type:
- Article
Recommendation of secure group communication schemes using multi-objective optimization.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1291, doi. 10.1007/s10207-023-00692-0
- By:
- Publication type:
- Article
AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1333, doi. 10.1007/s10207-023-00693-z
- By:
- Publication type:
- Article
cFEM: a cluster based feature extraction method for network intrusion detection.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1355, doi. 10.1007/s10207-023-00694-y
- By:
- Publication type:
- Article
A defensive framework for deepfake detection under adversarial settings using temporal and spatial features.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1371, doi. 10.1007/s10207-023-00695-x
- By:
- Publication type:
- Article
Correction: Real-time detection of deception attacks in cyber-physical systems.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
A method for insider threat assessment by modeling the internal employee interactions.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1385, doi. 10.1007/s10207-023-00697-9
- By:
- Publication type:
- Article
OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1395, doi. 10.1007/s10207-023-00698-8
- By:
- Publication type:
- Article
AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1423, doi. 10.1007/s10207-023-00699-7
- By:
- Publication type:
- Article
Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1445, doi. 10.1007/s10207-023-00700-3
- By:
- Publication type:
- Article
An effective attack scenario construction model based on identification of attack steps and stages.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1481, doi. 10.1007/s10207-023-00701-2
- By:
- Publication type:
- Article
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1497, doi. 10.1007/s10207-023-00702-1
- By:
- Publication type:
- Article
An autoML network traffic analyzer for cyber threat detection.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1511, doi. 10.1007/s10207-023-00703-0
- By:
- Publication type:
- Article