Works matching IS 25233246 AND DT 2021 AND VI 4 AND IP 1
Results: 39
LSGAN-AT: enhancing malware detector robustness against adversarial examples.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00102-9
- By:
- Publication type:
- Article
Privacy preserving divisible double auction with a hybridized TEE-blockchain system.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00100-x
- By:
- Publication type:
- Article
Indexing structures for the PLS blockchain.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00101-w
- By:
- Publication type:
- Article
Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00099-1
- By:
- Publication type:
- Article
Verifiable image revision from chameleon hashes.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00097-3
- By:
- Publication type:
- Article
Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00096-4
- By:
- Publication type:
- Article
Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00098-2
- By:
- Publication type:
- Article
Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00098-2
- By:
- Publication type:
- Article
Confidential machine learning on untrusted platforms: a survey.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00092-8
- By:
- Publication type:
- Article
Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00086-6
- By:
- Publication type:
- Article
ICPFuzzer: proprietary communication protocol fuzzing by using machine learning and feedback strategies.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00087-5
- By:
- Publication type:
- Article
Efficient functional encryption for inner product with simulation-based security.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-020-00067-1
- By:
- Publication type:
- Article
LSTM RNN: detecting exploit kits using redirection chain sequences.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00093-7
- By:
- Publication type:
- Article
Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00095-5
- By:
- Publication type:
- Article
Evaluation indicators for open-source software: a review.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00084-8
- By:
- Publication type:
- Article
A PLS blockchain for IoT applications: protocols and architecture.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-020-00068-0
- By:
- Publication type:
- Article
Quantum key recovery attack on SIMON32/64.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00089-3
- By:
- Publication type:
- Article
Social engineering in cybersecurity: a domain ontology and knowledge graph application examples.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00094-6
- By:
- Publication type:
- Article
A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-020-00066-2
- By:
- Publication type:
- Article
B2SMatcher: fine-Grained version identification of open-Source software in binary files.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00085-7
- By:
- Publication type:
- Article
ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00091-9
- By:
- Publication type:
- Article
A renewable energy forecasting and control approach to secured edge-level efficiency in a distributed micro-grid.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-020-00065-3
- By:
- Publication type:
- Article
VAECGAN: a generating framework for long-term prediction in multivariate time series.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00090-w
- By:
- Publication type:
- Article
Bin2vec: learning representations of binary executable programs for security tasks.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00088-4
- By:
- Publication type:
- Article
Hypervisor-assisted dynamic malware analysis.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00083-9
- By:
- Publication type:
- Article
A secure and highly efficient first-order masking scheme for AES linear operations.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00082-w
- By:
- Publication type:
- Article
Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00081-x
- By:
- Publication type:
- Article
DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00079-5
- By:
- Publication type:
- Article
An efficient fully dynamic group signature with message dependent opening from lattice.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00076-8
- By:
- Publication type:
- Article
TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00075-9
- By:
- Publication type:
- Article
Data and knowledge-driven named entity recognition for cyber security.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00072-y
- By:
- Publication type:
- Article
Deriving invariant checkers for critical infrastructure using axiomatic design principles.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00069-7
- By:
- Publication type:
- Article
Precision time protocol attack strategies and their resistance to existing security extensions.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00080-y
- By:
- Publication type:
- Article
An end-to-end text spotter with text relation networks.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00073-x
- By:
- Publication type:
- Article
A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00077-7
- By:
- Publication type:
- Article
Neutron: an attention-based neural decompiler.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00070-0
- By:
- Publication type:
- Article
Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00078-6
- By:
- Publication type:
- Article
An efficient hybrid system for anomaly detection in social networks.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00074-w
- By:
- Publication type:
- Article
Cascading effects of cyber-attacks on interconnected critical infrastructure.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00071-z
- By:
- Publication type:
- Article