Works matching IS 25233246 AND DT 2024 AND VI 7 AND IP 1
Results: 79
A novel approach for detecting malicious hosts based on RE-GCN in intranet.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00242-8
- By:
- Publication type:
- Article
A survey on the application of blockchain in cryptographic protocols: A survey on the application of blockchain...: X. Luo et al.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00324-7
- By:
- Publication type:
- Article
UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00252-6
- By:
- Publication type:
- Article
Dual-verification-based model fingerprints against ambiguity attacks: Dual-verification-based model...: B. Zhao et al.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00298-6
- By:
- Publication type:
- Article
Double-sided: tight proofs for guessing games in the quantum random oracle model.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00228-6
- By:
- Publication type:
- Article
Lattice-based cryptanalysis of RSA-type cryptosystems: a bibliometric analysis.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00289-7
- By:
- Publication type:
- Article
Fedrtid: an efficient shuffle federated learning via random participation and adaptive time constraint.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00293-x
- By:
- Publication type:
- Article
Analysis on dendritic deep learning model for AMR task.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00306-9
- By:
- Publication type:
- Article
Enabling per-file data recovery from ransomware attacks via file system forensics and flash translation layer data extraction.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00287-9
- By:
- Publication type:
- Article
Designated confirmer threshold signature and its applications in blockchains.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00256-2
- By:
- Publication type:
- Article
Improved integral neural distinguisher model for lightweight cipher PRESENT.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00258-0
- By:
- Publication type:
- Article
Analysis on dendritic deep learning model for AMR task.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00306-9
- By:
- Publication type:
- Article
A Robust joint coverless image steganography scheme based on two independent modules.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00299-5
- By:
- Publication type:
- Article
Renyi entropy-driven network traffic anomaly detection with dynamic threshold.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00249-1
- By:
- Publication type:
- Article
The quantum circuit implementation and feasibility analysis of quantum public-key cryptosystem based on the QSCDff problem.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00257-1
- By:
- Publication type:
- Article
A new S-box pattern generation based on chaotic enhanced logistic map: case of 5-bit S-box.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00254-4
- By:
- Publication type:
- Article
An efficient and versatile e-voting scheme on blockchain.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00226-8
- By:
- Publication type:
- Article
Mi-maml: classifying few-shot advanced malware using multi-improved model-agnostic meta-learning.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00314-9
- By:
- Publication type:
- Article
Enhanced anomaly traffic detection framework using BiGAN and contrastive learning.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00297-7
- By:
- Publication type:
- Article
Enhanced reversible data hiding using difference expansion and modulus function with selective bit blocks in images.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00251-7
- By:
- Publication type:
- Article
Simultaneously resettable zero knowledge protocol in Public Key model.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00253-5
- By:
- Publication type:
- Article
In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00209-9
- By:
- Publication type:
- Article
Atomic cross-chain swap based on private key exchange.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-023-00202-8
- By:
- Publication type:
- Article
A proactive defense method against eavesdropping attack in SDN-based storage environment.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00255-3
- By:
- Publication type:
- Article
Research on distribution automation security situational awareness technology based on risk transmission path and multi-source information fusion.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00259-z
- By:
- Publication type:
- Article
Research on distribution automation security situational awareness technology based on risk transmission path and multi-source information fusion.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00259-z
- By:
- Publication type:
- Article
Telemedicine data secure sharing scheme based on heterogeneous federated learning.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00250-8
- By:
- Publication type:
- Article
Securing transactions: a hybrid dependable ensemble machine learning model using IHT-LR and grid search.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00221-z
- By:
- Publication type:
- Article
Revisiting the shuffle of generalized Feistel structure.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00220-0
- By:
- Publication type:
- Article
Telemedicine data secure sharing scheme based on heterogeneous federated learning.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00250-8
- By:
- Publication type:
- Article
MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00245-5
- By:
- Publication type:
- Article
Honey password vaults tolerating leakage of both personally identifiable information and passwords.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00236-6
- By:
- Publication type:
- Article
Optimum noise mechanism for differentially private queries in discrete finite sets.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00239-3
- By:
- Publication type:
- Article
Discovering API usage specifications for security detection using two-stage code mining.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00224-w
- By:
- Publication type:
- Article
GAPS: GPU-accelerated processing service for SM9.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00217-9
- By:
- Publication type:
- Article
Break-Pad: effective padding machines for tor with break burst padding.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00222-y
- By:
- Publication type:
- Article
Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00246-4
- By:
- Publication type:
- Article
SIFT: Sifting file types—application of explainable artificial intelligence in cyber forensics.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00241-9
- By:
- Publication type:
- Article
Modelling user notification scenarios in privacy policies.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00234-8
- By:
- Publication type:
- Article
CommanderUAP: a practical and transferable universal adversarial attacks on speech recognition models.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00218-8
- By:
- Publication type:
- Article
FLSec-RPL: a fuzzy logic-based intrusion detection scheme for securing RPL-based IoT networks against DIO neighbor suppression attacks.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00223-x
- By:
- Publication type:
- Article
HSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-023-00201-9
- By:
- Publication type:
- Article
New partial key exposure attacks on RSA with additive exponent blinding.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00214-y
- By:
- Publication type:
- Article
Dynamic group fuzzy extractor.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00210-2
- By:
- Publication type:
- Article
EvilPromptFuzzer: generating inappropriate content based on text-to-image models.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00279-9
- By:
- Publication type:
- Article
ProcSAGE: an efficient host threat detection method based on graph representation learning.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00240-w
- By:
- Publication type:
- Article
Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00247-3
- By:
- Publication type:
- Article
A multi-channel spatial information feature based human pose estimation algorithm.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00248-2
- By:
- Publication type:
- Article
TVRAVNF: an efficient low-cost TEE-based virtual remote attestation scheme for virtual network functions.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00235-7
- By:
- Publication type:
- Article
Efficient post-quantum secure deterministic wallet scheme.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00216-w
- By:
- Publication type:
- Article