Works matching IS 25233246 AND DT 2020 AND VI 3 AND IP 1
Results: 21
Sifu - a cybersecurity awareness platform with challenge assessment and intelligent coach.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-020-00064-4
- By:
- Publication type:
- Article
On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-020-00063-5
- By:
- Publication type:
- Article
Inner product encryption from ring learning with errors.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. N.PAG, doi. 10.1186/s42400-020-00062-6
- By:
- Publication type:
- Article
Practical pairing-Free sensor cooperation scheme for cloud-Assisted wireless body area networks.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. N.PAG, doi. 10.1186/s42400-020-00061-7
- By:
- Publication type:
- Article
Development of anti-phishing browser based on random forest and rule of extraction framework.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. N.PAG, doi. 10.1186/s42400-020-00059-1
- By:
- Publication type:
- Article
An emerging threat Fileless malware: a survey and research challenges.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-019-0043-x
- By:
- Publication type:
- Article
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. N.PAG, doi. 10.1186/s42400-020-00058-2
- By:
- Publication type:
- Article
Lightning-fast and privacy-preserving outsourced computation in the cloud.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. N.PAG, doi. 10.1186/s42400-020-00057-3
- By:
- Publication type:
- Article
A novel feature extraction methodology using Siamese convolutional neural networks for intrusion detection.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-020-00056-4
- By:
- Publication type:
- Article
Malware Guard Extension: abusing Intel SGX to conceal cache attacks.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-019-0042-y
- By:
- Publication type:
- Article
Automating threat modeling using an ontology framework: Validated with data from critical infrastructures.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. N.PAG, doi. 10.1186/s42400-020-00060-8
- By:
- Publication type:
- Article
Conceptualisation of Cyberattack prediction with deep learning.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-020-00053-7
- By:
- Publication type:
- Article
Using deep learning to solve computer security challenges: a survey.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-020-00055-5
- By:
- Publication type:
- Article
Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-020-00052-8
- By:
- Publication type:
- Article
Server-aided immediate and robust user revocation mechanism for SM9.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-020-00054-6
- By:
- Publication type:
- Article
Iso-UniK: lightweight multi-process unikernel through memory protection keys.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-020-00051-9
- By:
- Publication type:
- Article
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-020-00049-3
- By:
- Publication type:
- Article
Review and insight on the behavioral aspects of cybersecurity.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-020-00050-w
- By:
- Publication type:
- Article
Under false flag: using technical artifacts for cyber attack attribution.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-020-00048-4
- By:
- Publication type:
- Article
A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-020-00046-6
- By:
- Publication type:
- Article
Predicting individuals' vulnerability to social engineering in social networks.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-020-00047-5
- By:
- Publication type:
- Article