Works matching IS 25233246 AND DT 2018 AND VI 1 AND IP 1
Results: 16
Making a good thing better: enhancing password/PIN-based user authentication with smartwatch.
- Published in:
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0009-4
- By:
- Publication type:
- Article
CCA1 secure FHE from PIO, revisited.
- Published in:
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0013-8
- By:
- Publication type:
- Article
A survey of practical adversarial example attacks.
- Published in:
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0012-9
- By:
- Publication type:
- Article
Automated identification of sensitive data from implicit user specification.
- Published in:
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0011-x
- By:
- Publication type:
- Article
Sensitive system calls based packed malware variants detection using principal component initialized MultiLayers neural networks.
- Published in:
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0010-y
- By:
- Publication type:
- Article
Detecting telecommunication fraud by understanding the contents of a call.
- Published in:
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0008-5
- By:
- Publication type:
- Article
Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes.
- Published in:
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0007-6
- By:
- Publication type:
- Article
DroidEcho: an in-depth dissection of malicious behaviors in Android applications.
- Published in:
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0006-7
- By:
- Publication type:
- Article
Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a survey.
- Published in:
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0005-8
- By:
- Publication type:
- Article
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks.
- Published in:
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0003-x
- By:
- Publication type:
- Article
Fuzzing: a survey.
- Published in:
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0002-y
- By:
- Publication type:
- Article
Graph-based visual analytics for cyber threat intelligence.
- Published in:
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0017-4
- By:
- Publication type:
- Article
Forecasting cyberattacks with incomplete, imbalanced, and insignificant data.
- Published in:
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0016-5
- By:
- Publication type:
- Article
Concurrent non-malleable zero-knowledge and simultaneous resettable non-malleable zero-knowledge in constant rounds.
- Published in:
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0014-7
- By:
- Publication type:
- Article
Cloud repository as a malicious service: challenge, identification and implication.
- Published in:
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0015-6
- By:
- Publication type:
- Article
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing.
- Published in:
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0001-z
- By:
- Publication type:
- Article