Works matching IS 25233246 AND DT 2022 AND VI 5 AND IP 1
Results: 33
Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognition.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00131-y
- By:
- Publication type:
- Article
Unleashing the power of pseudo-code for binary code similarity analysis.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00121-0
- By:
- Publication type:
- Article
Sarve: synthetic data and local differential privacy for private frequency estimation.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00129-6
- By:
- Publication type:
- Article
Deep 3D mesh watermarking with self-adaptive robustness.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00125-w
- By:
- Publication type:
- Article
Study of methods for endpoint aware inspection in a next generation firewall.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00127-8
- By:
- Publication type:
- Article
A decade of research on patterns and architectures for IoT security.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-021-00104-7
- By:
- Publication type:
- Article
Valet attack on privacy: a cybersecurity threat in automotive Bluetooth infotainment systems.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00132-x
- By:
- Publication type:
- Article
A fully dynamic forward-secure group signature from lattice.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00122-z
- By:
- Publication type:
- Article
The differential fault analysis on block cipher FeW.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00130-z
- By:
- Publication type:
- Article
Phishing website prediction using base and ensemble classifier techniques with cross-validation.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00126-9
- By:
- Publication type:
- Article
NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00120-1
- By:
- Publication type:
- Article
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-021-00106-5
- By:
- Publication type:
- Article
A lightweight DDoS detection scheme under SDN context.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00128-7
- By:
- Publication type:
- Article
Sarve: synthetic data and local differential privacy for private frequency estimation.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00129-6
- By:
- Publication type:
- Article
PUMD: a PU learning-based malicious domain detection framework.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00124-x
- By:
- Publication type:
- Article
Hybrid dual attack on LWE with arbitrary secrets.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00115-y
- By:
- Publication type:
- Article
Embedded fuzzing: a review of challenges, tools, and solutions.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00123-y
- By:
- Publication type:
- Article
CAMFuzz: Explainable Fuzzing with Local Interpretation.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00116-x
- By:
- Publication type:
- Article
Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-021-00103-8
- By:
- Publication type:
- Article
The inconsistency of documentation: a study of online C standard library documents.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00118-9
- By:
- Publication type:
- Article
Hash-based signature revisited.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00117-w
- By:
- Publication type:
- Article
Improved conditional differential attacks on lightweight hash family QUARK.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-021-00108-3
- By:
- Publication type:
- Article
Hash-based signature revisited.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00117-w
- By:
- Publication type:
- Article
A flexible approach for cyber threat hunting based on kernel audit records.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00111-2
- By:
- Publication type:
- Article
Enabling data-driven anomaly detection by design in cyber-physical production systems.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00114-z
- By:
- Publication type:
- Article
Generic, efficient and isochronous Gaussian sampling over the integers.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00113-0
- By:
- Publication type:
- Article
Enabling data-driven anomaly detection by design in cyber-physical production systems.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00114-z
- By:
- Publication type:
- Article
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00110-3
- By:
- Publication type:
- Article
Abstract security patterns and the design of secure systems.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00109-w
- By:
- Publication type:
- Article
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00110-3
- By:
- Publication type:
- Article
Identifying high-risk over-entitlement in access control policies using fuzzy logic.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00112-1
- By:
- Publication type:
- Article
Blockchain abnormal behavior awareness methods: a survey.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-021-00107-4
- By:
- Publication type:
- Article
Threats, attacks and defenses to federated learning: issues, taxonomy and perspectives.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-021-00105-6
- By:
- Publication type:
- Article