


default search action
Emerging Trends in Cybersecurity Applications, 2023
- Kevin Daimi, Abeer Alsadoon, Cathryn Peoples, Nour El Madhoun:

Emerging Trends in Cybersecurity Applications. Springer International Publishing 2023, ISBN 978-3-031-09639-6 - Osman Salem, Ahmed Mehaoua:

Ephemeral Elliptic Curve Diffie-Hellman to Secure Data Exchange in Internet of Medical Things. 3-20 - Sairath Bhattacharjya, Hossein Saiedian

:
End-to-End Security for IoT Communications: A Practical Implementation. 21-43 - Ly Vu, Quang Uy Nguyen, Dinh Thai Hoang, Diep N. Nguyen

, Eryk Dutkiewicz
:
A Novel Transfer Learning Model for Intrusion Detection Systems in IoT Networks. 45-65 - Fadi Mohsen, Adel Shtayyeh, Marten Struijk, Riham Naser, Lena Mohammad:

An Approach to Guide Users Towards Less Revealing Internet Browsers. 69-94 - Selahattin Hürol Türen, Md. Rafiqul Islam

, Kenneth Eustace:
Analysing the Threat Landscape Inside the Dark Web. 95-122 - João Marques-Silva, Nuno Souto:

A Secured 5G Network Slices Auction Broker. 123-136 - Yvette Colomb, Peter White, Rafiqul Islam

, Abeer Alsadoon:
Applying Zero Trust Architecture and Probability-Based Authentication to Preserve Security and Privacy of Data in the Cloud. 137-169 - Germán E. Rodríguez

, Jenny G. Torres, Eduardo Benavides-Astudillo
:
DataCookie: Sorting Cookies Using Data Mining for Prevention of Cross-Site Scripting (XSS). 171-188 - Chao Chen, Ugur-Ilker Atmaca, Konstantinos Koufos, Mehrdad Dianati

, Carsten Maple:
Analysing Cyber Attacks and Risks in V2X-Assisted Autonomous Highway Merging. 191-208 - Nourhène Ben Rabah, Hanen Idoudi:

A Machine Learning Framework for Intrusion Detection in VANET Communications. 209-227 - Jinming Ma, Tianbing Xia

, Janusz R. Getta:
The Implementation of Uncertainty Models for Fraud Detection on Mobile Advertising. 231-249 - Nuno Realista, Francisco Palma, Carlos Serrão, Luís Nunes

, Ana de Almeida
:
Improving Android Application Quality Through Extendable, Automated Security Testing. 251-274 - Rachana Yogesh Patil, Yogesh H. Patil, Aparna Bannore, Arijit Karati

, Renu Kachhoriya, Manjiri Ranjanikar:
A Provably Secure Data Sharing Scheme for Smart Gas Grid in Fog Computing Environment. 277-299 - Richard Bean, Yanjun Zhang, Ryan K. L. Ko

, Xinyu Mao, Guangdong Bai
:
Preserving the Privacy and Cybersecurity of Home Energy Data. 301-322 - Richard Bean, Yanjun Zhang, Ryan K. L. Ko, Xinyu Mao

, Guangdong Bai
:
Preserving the Privacy and Cybersecurity of Home Energy Data. 323-343 - Jose Rubio-Hernan, Luca De Cicco, Joaquín García-Alfaro

:
Non-stationary Watermark-Based Attack Detection to Protect Cyber-Physical Control Systems. 347-370 - Jiao Yin

, MingJian Tang, Jinli Cao, Mingshan You, Hua Wang:
Cybersecurity Applications in Software: Data-Driven Software Vulnerability Assessment and Management. 371-389 - Yulliwas Ameur

, Samia Bouzefrane, Vincent Audigier:
Application of Homomorphic Encryption in Machine Learning. 391-410 - Cathryn Peoples, Adrian Moore, Nektarios Georgalas:

The Design of Ethical Service-Level Agreements to Protect Cyber Attackers and Attackees. 413-440 - Yuxiao Zhang, Qingfeng Chen, Xinkun Hao, Haiming Pan, Qian Yu, Kexin Huang:

Defense Against Adversarial Attack on Knowledge Graph Embedding. 441-461

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














