Works matching IS 25233246 AND DT 2019 AND VI 2 AND IP 1
Results: 26
Human-as-a-security-sensor for harvesting threat intelligence.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0040-0
- By:
- Publication type:
- Article
One-way information reconciliation schemes of quantum key distribution.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0033-z
- By:
- Publication type:
- Article
Correction to: Human-as-a-security-sensor for harvesting threat intelligence.
- Published in:
- 2019
- By:
- Publication type:
- Correction Notice
Human-as-a-security-sensor for harvesting threat intelligence.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0040-0
- By:
- Publication type:
- Article
Predicate encryption against master-key tampering attacks.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0039-6
- By:
- Publication type:
- Article
Survey of intrusion detection systems: techniques, datasets and challenges.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0038-7
- By:
- Publication type:
- Article
An efficient full dynamic group signature scheme over ring.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0037-8
- By:
- Publication type:
- Article
On the use of Max-SAT and PDDL in RBAC maintenance.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0036-9
- By:
- Publication type:
- Article
(Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0034-y
- By:
- Publication type:
- Article
Memory access integrity: detecting fine-grained memory access errors in binary code.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0035-x
- By:
- Publication type:
- Article
One-way information reconciliation schemes of quantum key distribution.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0033-z
- By:
- Publication type:
- Article
ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0032-0
- By:
- Publication type:
- Article
Creeper: a tool for detecting permission creep in file system access controls.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0031-1
- By:
- Publication type:
- Article
Towards IP geolocation with intermediate routers based on topology discovery.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0030-2
- By:
- Publication type:
- Article
From proof-of-concept to exploitable: (One step towards automatic exploitability assessment).
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0028-9
- By:
- Publication type:
- Article
Adversarial attack and defense in reinforcement learning-from AI security view.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0027-x
- By:
- Publication type:
- Article
Group topic-author model for efficient discovery of latent social astroturfing groups in tourism domain.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0029-8
- By:
- Publication type:
- Article
PathMarker: protecting web contents against inside crawlers.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0023-1
- By:
- Publication type:
- Article
Comprehensive evaluation of key management hierarchies for outsourced data.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0026-y
- By:
- Publication type:
- Article
Privacy-preserving decision tree for epistasis detection.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0025-z
- By:
- Publication type:
- Article
A framework for the extended evaluation of ABAC policies.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0024-0
- By:
- Publication type:
- Article
The privacy protection mechanism of Hyperledger Fabric and its application in supply chain finance.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0022-2
- By:
- Publication type:
- Article
Semi Markov process inspired selfish aware co-operative scheme for wireless sensor networks (SMPISCS).
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-019-0021-3
- By:
- Publication type:
- Article
Access control technologies for Big Data management systems: literature review and future trends.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0020-9
- By:
- Publication type:
- Article
Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0019-2
- By:
- Publication type:
- Article
DTrace: fine-grained and efficient data integrity checking with hardware instruction tracing.
- Published in:
- Cybersecurity (2523-3246), 2019, v. 2, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0018-3
- By:
- Publication type:
- Article