Works matching IS 25233246 AND DT 2023 AND VI 6 AND IP 1
Results: 57
Tor network anonymity evaluation based on node anonymity.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00191-8
- By:
- Publication type:
- Article
WAS: improved white-box cryptographic algorithm over AS iteration.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00192-7
- By:
- Publication type:
- Article
Towards the transferable audio adversarial attack via ensemble methods.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00175-8
- By:
- Publication type:
- Article
Minimizing CNOT-count in quantum circuit of the extended Shor's algorithm for ECDLP.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00181-w
- By:
- Publication type:
- Article
Verifiable delay functions and delay encryptions from hyperelliptic curves.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00189-2
- By:
- Publication type:
- Article
EPASAD: ellipsoid decision boundary based Process-Aware Stealthy Attack Detector.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00162-z
- By:
- Publication type:
- Article
Full-round impossible differential attack on shadow block cipher.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00184-7
- By:
- Publication type:
- Article
Research on privacy information retrieval model based on hybrid homomorphic encryption.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00168-7
- By:
- Publication type:
- Article
Performance evaluation of Cuckoo filters as an enhancement tool for password cracking.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00193-6
- By:
- Publication type:
- Article
LayerCFL: an efficient federated learning with layer-wised clustering.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00172-x
- By:
- Publication type:
- Article
A novel botnet attack detection for IoT networks based on communication graphs.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00169-6
- By:
- Publication type:
- Article
Machine learning based fileless malware traffic classification using image visualization.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00170-z
- By:
- Publication type:
- Article
MSLFuzzer: black-box fuzzing of SOHO router devices via message segment list inference.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00186-5
- By:
- Publication type:
- Article
Generic attacks on small-state stream cipher constructions in the multi-user setting.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00188-3
- By:
- Publication type:
- Article
Improved lower bound for the complexity of unique shortest vector problem.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00173-w
- By:
- Publication type:
- Article
Evolution of blockchain consensus algorithms: a review on the latest milestones of blockchain consensus algorithms.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00163-y
- By:
- Publication type:
- Article
A deep learning aided differential distinguisher improvement framework with more lightweight and universality.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00176-7
- By:
- Publication type:
- Article
Attack based on data: a novel perspective to attack sensitive points directly.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00179-4
- By:
- Publication type:
- Article
Evicting and filling attack for linking multiple network addresses of Bitcoin nodes.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00182-9
- By:
- Publication type:
- Article
Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00180-x
- By:
- Publication type:
- Article
Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00160-1
- By:
- Publication type:
- Article
IHVFL: a privacy-enhanced intention-hiding vertical federated learning framework for medical data.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00166-9
- By:
- Publication type:
- Article
Intrusion detection systems for wireless sensor networks using computational intelligence techniques.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00161-0
- By:
- Publication type:
- Article
Detecting fake reviewers in heterogeneous networks of buyers and sellers: a collaborative training-based spammer group algorithm.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00159-8
- By:
- Publication type:
- Article
Continuously non-malleable codes from block ciphers in split-state model.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00152-1
- By:
- Publication type:
- Article
Use of subword tokenization for domain generation algorithm classification.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00183-8
- By:
- Publication type:
- Article
A buffer overflow detection and defense method based on RISC-V instruction set extension.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00164-x
- By:
- Publication type:
- Article
Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00178-5
- By:
- Publication type:
- Article
Detecting compromised email accounts via login behavior characterization.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00167-8
- By:
- Publication type:
- Article
Security estimation of LWE via BKW algorithms.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00158-9
- By:
- Publication type:
- Article
A convolutional neural network to detect possible hidden data in spatial domain images.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00156-x
- By:
- Publication type:
- Article
Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00155-y
- By:
- Publication type:
- Article
Towards the universal defense for query-based audio adversarial attacks on speech recognition system.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00177-6
- By:
- Publication type:
- Article
FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00171-y
- By:
- Publication type:
- Article
MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00157-w
- By:
- Publication type:
- Article
AppChainer: investigating the chainability among payloads in android applications.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00151-2
- By:
- Publication type:
- Article
Enhancing non-profiled side-channel attacks by time-frequency analysis.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00149-w
- By:
- Publication type:
- Article
An efficient confidentiality protection solution for pub/sub system.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00165-w
- By:
- Publication type:
- Article
NBA: defensive distillation for backdoor removal via neural behavior alignment.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00154-z
- By:
- Publication type:
- Article
Are our clone detectors good enough? An empirical study of code effects by obfuscation.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00148-x
- By:
- Publication type:
- Article
SkillSim: voice apps similarity detection.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00150-3
- By:
- Publication type:
- Article
Rainbow: reliable personally identifiable information retrieval across multi-cloud.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00146-z
- By:
- Publication type:
- Article
Reversible data hiding based on histogram and prediction error for sharing secret data.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00147-y
- By:
- Publication type:
- Article
PosFuzz: augmenting greybox fuzzing with effective position distribution.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00143-2
- By:
- Publication type:
- Article
IPatch: a remote adversarial patch.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00145-0
- By:
- Publication type:
- Article
Confidential computing and related technologies: a critical review.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00144-1
- By:
- Publication type:
- Article
DLP: towards active defense against backdoor attacks with decoupled learning process.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00141-4
- By:
- Publication type:
- Article
An ensemble deep learning based IDS for IoT using Lambda architecture.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-022-00133-w
- By:
- Publication type:
- Article
Jeu de mots paronomasia: a StackOverflow-driven bug discovery approach.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00153-0
- By:
- Publication type:
- Article
Exploring best-matched embedding model and classifier for charging-pile fault diagnosis.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00138-z
- By:
- Publication type:
- Article