default search action
Security and Communication Networks, Volume 2019
Volume 2019, 2019
- Yubiao Wang, Junhao Wen, Xibin Wang, Bamei Tao, Wei Zhou:
A Cloud Service Trust Evaluation Model Based on Combining Weights and Gray Correlation Analysis. 2437062:1-2437062:11 - Shuang Zhao, Shuhui Chen, Yipin Sun, Zhiping Cai, Jinshu Su:
Identifying Known and Unknown Mobile Application Traffic Using a Multilevel Classifier. 9595081:1-9595081:11 - Xiaoye Li, Jing Yang, Zhenlong Sun, Jianpei Zhang:
Differentially Private Release of the Distribution of Clustering Coefficients across Communities. 2518714:1-2518714:9 - Yuichi Komano, Kazuo Ohta, Kazuo Sakiyama, Mitsugu Iwamoto, Ingrid Verbauwhede:
Single-Round Pattern Matching Key Generation Using Physically Unclonable Function. 1719585:1-1719585:13 - Ángel Martín del Rey, Lu-Xing Yang, Vasileios Karyotis:
Mathematical Models for Malware Propagation. 6046353:1-6046353:2 - Mohamed Ali Hajjaji, Mohamed Gafsi, Abdessalem Ben Abdelali, Abdellatif Mtibaa:
FPGA Implementation of Digital Images Watermarking System Based on Discrete Haar Wavelet Transform. 1294267:1-1294267:17 - Liran Ma, Yan Huo, Chunqiang Hu, Wei Li:
Security and Privacy for Smart Cyber-Physical Systems. 7045862:1-7045862:2 - Ming Xu, Weili Han:
An Explainable Password Strength Meter Addon via Textual Pattern Recognition. 5184643:1-5184643:10 - Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu:
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy. 1816393:1-1816393:12 - Zhenjun Tang, Ye Yang, Shijie Xu, Chunqiang Yu, Xianquan Zhang:
Image Encryption with Double Spiral Scans and Chaotic Maps. 8694678:1-8694678:15 - Rashid Abbasi, Lixiang Xu, Farhan Amin, Bin Luo:
Efficient Lossless Compression Based Reversible Data Hiding Using Multilayered n-Bit Localization. 8981240:1-8981240:13 - Baodong Qin:
Tightly Secure Lossy Trapdoor Functions: Constructions and Applications. 3636759:1-3636759:13 - Xu Wang, Bo Song, Wei Ni, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng:
Group-Based Susceptible-Infectious-Susceptible Model in Large-Scale Directed Networks. 1657164:1-1657164:9 - Yunxue Yan, Lei Wu, Wenyu Xu, Hao Wang, Zhaoman Liu:
Integrity Audit of Shared Cloud Data with Identity Tracking. 1354346:1-1354346:11 - JingJing Wang, Yiliang Han, Xiaoyuan Yang, Tanping Zhou, Jiayong Chen:
A New Group Location Privacy-Preserving Method Based on Distributed Architecture in LBS. 2414687:1-2414687:14 - Yuntao Zhao, Bo Bo, Yongxin Feng, ChunYu Xu, Bo Yu:
A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning. 2674684:1-2674684:8 - Laurence T. Yang, Wei Wang, Gregorio Martínez Pérez, Willy Susilo:
Security, Privacy, and Trust for Cyberphysical-Social Systems. 2964673:1-2964673:2 - Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang:
RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications. 3263902:1-3263902:26 - Viet Cuong Trinh:
A Short Server-Aided Certificateless Aggregate Multisignature Scheme in the Standard Model. 3424890:1-3424890:14 - Wenli Shang, Tianyu Gong, Chunyu Chen, Jing Hou, Peng Zeng:
Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees. 3574675:1-3574675:11 - Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos, Bruno Bogaz Zarpelão:
Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks. 3745619:1-3745619:13 - Teng Hu, Weina Niu, Xiaosong Zhang, Xiaolei Liu, Jiazhong Lu, Yuan Liu:
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning. 3898951:1-3898951:12 - Darong Huang, Lanyan Ke, Bo Mi, Guosheng Wei, Jian Wang, Shaohua Wan:
A Cooperative Denoising Algorithm with Interactive Dynamic Adjustment Function for Security of Stacker in Industrial Internet of Things. 4049765:1-4049765:16 - Jian Sun, Guanhua Huang, Arun Kumar Sangaiah, Guangyang Zhu, Xiaojiang Du:
Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective. 4074272:1-4074272:15 - Toan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong:
Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment. 4250743:1-4250743:11 - Yasuyuki Kawanishi, Hideaki Nishihara, Daisuke Souma, Hirotaka Yoshida, Yoichi Hata:
A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design. 4614721:1-4614721:35 - Bin Ma, Bing Li, Xiao-Yu Wang, Chunpeng Wang, Jian Li, Yun-Qing Shi:
Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image. 4732632:1-4732632:9 - Soultana Ellinidou, Gaurav Sharma, Théo Rigas, Tristan Vanspouwen, Olivier Markowitch, Jean-Michel Dricot:
SSPSoC: A Secure SDN-Based Protocol over MPSoC. 4869167:1-4869167:11 - Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski:
Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System. 4930908:1-4930908:22 - Dhanu Dwiardhika, Takuji Tachibana:
Virtual Network Embedding Based on Security Level with VNF Placement. 5640134:1-5640134:11 - Jin Wook Byun:
A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function. 5935292:1-5935292:15 - Han Zhang, Yuanbo Guo, Tao Li:
Multifeature Named Entity Recognition in Information Security Based on Adversarial Learning. 6417407:1-6417407:9 - Marcin Luckner:
Practical Web Spam Lifelong Machine Learning System with Automatic Adjustment to Current Lifecycle Phase. 6587020:1-6587020:16 - Maurantonio Caprolu, Simone Raponi, Roberto Di Pietro:
FORTRESS: An Efficient and Distributed Firewall for Stateful Data Plane SDN. 6874592:1-6874592:16 - Guoyan Huang, Qian Wang, Xinqian Liu, Xiaobing Hao, Huaizhi Yan:
Mining the Key Nodes from Software Network Based on Fault Accumulation and Propagation. 7140480:1-7140480:11 - Hyun-A. Park:
Secure Information Sharing System for Online Patient Networks. 7541269:1-7541269:16 - Haiying Ma, Zhanjun Wang, Zhijin Guan:
Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation. 8093578:1-8093578:11 - Édgar Salguero Dorokhin, Walter Fuertes, Edison Lascano:
On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key. 8214681:1-8214681:10 - Wenting Shen, Jing Qin, Jixin Ma:
A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment. 8275074:1-8275074:15 - Yong-Seok Lee, Young-Ho Seo, Dong-Wook Kim:
Blind Image Watermarking Based on Adaptive Data Spreading in n-Level DWT Subbands. 8357251:1-8357251:11 - Jiadong Ren, Zhangqi Zheng, Qian Liu, Zhiyao Wei, Huaizhi Yan:
A Buffer Overflow Prediction Approach Based on Software Metrics and Machine Learning. 8391425:1-8391425:13 - Meiyu Zhang, Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan:
SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks. 8690853:1-8690853:12 - Fute Shang, Buhong Wang, Fuhu Yan, Tengyao Li:
Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems. 8936784:1-8936784:11 - Gustav Sourek, Filip Zelezný:
Efficient Extraction of Network Event Types from NetFlows. 8954914:1-8954914:18 - Mingfu Xue, Chengxiang Yuan, Zhe Liu, Jian Wang:
SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations. 9795621:1-9795621:18 - Yu Zhou, Yongzhuang Wei, Fengrong Zhang:
Measuring the Sum-of-Squares Indicator of Boolean Functions in Encryption Algorithm for Internet of Things. 1348639:1-1348639:15 - Joseph I. Choi, Kevin R. B. Butler:
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities. 1368905:1-1368905:28 - Vasyl Ustimenko, Urszula Romanczuk-Polubiec, Aneta Wróblewska, Monika Katarzyna Polak, Eustrat Zhupa:
On the Constructions of New Symmetric Ciphers Based on Nonbijective Multivariate Maps of Prescribed Degree. 2137561:1-2137561:15 - Hefeng Chen, Chin-Chen Chang:
A Novel (t, n) Secret Sharing Scheme Based upon Euler's Theorem. 2387358:1-2387358:7 - Haitao Song, Guangming Tang, Yifeng Sun, Zhanzhan Gao:
Security Measure for Image Steganography Based on High Dimensional KL Divergence. 3546367:1-3546367:13 - SeokHwan Choi, Jin-Myeong Shin, Yoon-Ho Choi:
Dynamic Nonparametric Random Forest Using Covariance. 3984031:1-3984031:12 - Nelson Ochieng, Waweru Mwangi, Ismail Ateya:
Optimizing Computer Worm Detection Using Ensembles. 4656480:1-4656480:10 - Yuntao Zhao, ChunYu Xu, Bo Bo, Yongxin Feng:
MalDeep: A Deep Learning Classification Framework against Malware Variants Based on Texture Visualization. 4895984:1-4895984:11 - Wenjie Liu, Peipei Gao, Zhihao Liu, Hanwu Chen, Maojun Zhang:
A Quantum-Based Database Query Scheme for Privacy Preservation in Cloud Environment. 4923590:1-4923590:14 - Jieren Cheng, Mengyang Li, Xiangyan Tang, Victor S. Sheng, Yifu Liu, Wei Guo:
Corrigendum to "Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing". 6809054:1 - Kevser Ovaz Akpinar, Ibrahim Özçelik:
Corrigendum to "Development of the ECAT Preprocessor with the Trust Communication Approach". 7457154:1 - Zhaoqing Pan, Ching-Nung Yang, Victor S. Sheng, Naixue Xiong, Weizhi Meng:
Machine Learning for Wireless Multimedia Data Security. 7682306:1-7682306:2 - Tran Khanh Dang, Khanh T. K. Tran:
The Meeting of Acquaintances: A Cost-Efficient Authentication Scheme for Light-Weight Objects with Transient Trust Level and Plurality Approach. 8123259:1-8123259:18 - Mahmoud Abu-Zant, Adwan Yasin:
Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV). 8249108:1-8249108:12 - Young-Seob Jeong, Jiyoung Woo, Ah Reum Kang:
Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks. 8485365:1-8485365:9 - Lei He, Jianfeng Ma, Ruo Mo, Dawei Wei:
Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing. 8583130:1-8583130:12 - Junhyoung Oh, Ukjin Lee, Kyungho Lee:
Usability Evaluation Model for Biometric System considering Privacy Concern Based on MCDM Model. 8715264:1-8715264:14 - Tianbo Lu, Ting Meng, Chao Li, Guozhen Dong, Huiyang Li, Jiao Zhang, Xiaoyan Zhang:
MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication. 9078176:1-9078176:15 - Federica Lago, Quoc-Tin Phan, Giulia Boato:
Visual and Textual Analysis for Image Trustworthiness Assessment within Online News. 9236910:1-9236910:14 - Yinqiao Xiong, Peidong Zhu, Zhizhu Liu, Hui Yin, Tiantian Deng:
EPLC: An Efficient Privacy-Preserving Line-Loss Calculation Scheme for Residential Areas of Smart Grid. 9637578:1-9637578:14 - Hoang-Nam Pham-Nguyen, Quang Tran Minh:
Dynamic Resource Provisioning on Fog Landscapes. 1798391:1-1798391:15 - Amirreza Niakanlahiji, Jafar Haadi Jafarian:
WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense. 2156906:1-2156906:13 - Ping Wang, Bin Li, Hongjin Shi, Yaosheng Shen, Ding Wang:
Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments. 2516963:1-2516963:13 - Yujiao Song, Hao Wang, Xiaochao Wei, Lei Wu:
Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud. 3249726:1-3249726:9 - Xuyun Zhang, Yuan Yuan, Zhili Zhou, Shancang Li, Lianyong Qi, Deepak Puthal:
Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things. 4529757:1-4529757:4 - Baosheng Wang, Yi Wang, Rongmao Chen:
A Practical Authentication Framework for VANETs. 4752612:1-4752612:11 - Libing Wu, Jing Wang, Sherali Zeadally, Debiao He:
Anonymous and Efficient Message Authentication Scheme for Smart Grid. 4836016:1-4836016:12 - E. Munivel, Kannammal Annadurai:
New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing. 5141395:1-5141395:11 - Yu Zhang, Yin Li, Yifan Wang:
Secure and Efficient Searchable Public Key Encryption for Resource Constrained Environment Based on Pairings under Prime Order Group. 5280806:1-5280806:14 - Leila Khatibzadeh, Zarrintaj Bornaee, Abbas Ghaemi Bafghi:
Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic. 5306395:1-5306395:11 - Mohamed Amine Ferrag, Leandros A. Maglaras, Abdelouahid Derhab:
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends. 5452870:1-5452870:20 - Ankang Ju, Yuanbo Guo, Ziwei Ye, Tao Li, Jing Ma:
HeteMSD: A Big Data Analytics Framework for Targeted Cyber-Attacks Detection Using Heterogeneous Multisource Data. 5483918:1-5483918:9 - Ye Yuan, Liji Wu, Yijun Yang, Xiangmin Zhang:
Erratum to "A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism". 5742308:1-5742308:2 - Jizhi Wang:
The Prediction of Serial Number in OpenSSL's X.509 Certificate. 6013846:1-6013846:11 - Hala Abu Dhailah, Eyad Taqieddin, Abdallah Y. Alma'aitah:
An Enhanced and Resource-Aware RFID Multitag Grouping Protocol. 6862052:1-6862052:15 - Jiaji Pan, Yi-Ning Liu, Weiming Zhang:
Detection of Dummy Trajectories Using Convolutional Neural Networks. 8431074:1-8431074:12 - Rui Zhu, Li Xu, Yali Zeng, Xun Yi:
Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification. 9126376:1-9126376:12 - Neline van Ginkel, Willem De Groef, Fabio Massacci, Frank Piessens:
A Server-Side JavaScript Security Architecture for Secure Integration of Third-Party Libraries. 9629034:1-9629034:21 - Peyman Jafary, Antti Supponen, Mikko Salmenperä, Sami Repo:
Analyzing Reliability of the Communication for Secure and Highly Available GOOSE-Based Logic Selectivity. 9682189:1-9682189:16 - Hojoong Park, Yongjin Yeom, Ju-Sung Kang:
A Lightweight BCH Code Corrector of TRNG with Measurable Dependence. 9684239:1-9684239:11 - Qian Lu, Haipeng Qu, Yuzhan Ouyang, Jiahui Zhang:
SLFAT: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames. 2718741:1-2718741:10 - Sanghoon Lee, Ik Rae Jeong:
A Cancelable Template for the Low-Quality Fingerprints from Wearable Devices. 4202671:1-4202671:8 - Quanbo Qu, Baocang Wang, Yuan Ping, Zhili Zhang:
Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme. 8319508:1-8319508:6 - Mengxia Shuai, Bin Liu, Nenghai Yu, Ling Xiong:
Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks. 8145087:1-8145087:14 - Yong Xie, Songsong Zhang, Xiang Li, Yanggui Li, Yuan Chai:
CasCP: Efficient and Secure Certificateless Authentication Scheme for Wireless Body Area Networks with Conditional Privacy-Preserving. 5860286:1-5860286:13 - Yu Zhan, Baocang Wang:
Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network. 6059834:1-6059834:5 - Kaifan Huang, Pengdeng Li, Lu-Xing Yang, Xiaofan Yang, Yuan Yan Tang:
Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach. 2315627:1-2315627:12 - Wei Bai, Zhisong Pan, Shize Guo, Zhe Chen:
RMMDI: A Novel Framework for Role Mining Based on the Multi-Domain Information. 8085303:1-8085303:15 - Yu Liu, Xiaolei Liu, Yanmin Zhao:
Security Cryptanalysis of NUX for the Internet of Things. 2062697:1-2062697:12 - Jiazhong Lu, Fengmao Lv, Zhongliu Zhuo, Xiaosong Zhang, Xiaolei Liu, Teng Hu, Wei Deng:
Integrating Traffics with Network Device Logs for Anomaly Detection. 5695021:1-5695021:10 - Jiadong Ren, Jiawei Guo, Qian Wang, Yuan Huang, Hao Xiaobing, Hu Jingjing:
Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms. 7130868:1-7130868:11 - Hisham A. Kholidy, Abdelkarim Erradi:
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems. 6816943:1-6816943:15 - Wei Sun, Hao Zhang, Li-jun Cai, Ai-min Yu, Jinqiao Shi, Jian-Guo Jiang:
A Novel Device Identification Method Based on Passive Measurement. 6045251:1-6045251:11 - Thein Than Thwin, Sangsuree Vasupongayya:
Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems. 8315614:1-8315614:15 - Feifei Wang, Guoai Xu, Chenyu Wang, Junhao Peng:
A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment. 2838615:1-2838615:15 - Chao Yang, Junwei Zhang, Jingjing Guo, Yu Zheng, Li Yang, Jianfeng Ma:
Fingerprint Protected Password Authentication Protocol. 1694702:1-1694702:12 - Chenghai Li, Fangzheng Zhao, Chen Liu, Lei Lei, Jie Zhang:
A Hyperchaotic Color Image Encryption Algorithm and Security Analysis. 8132547:1-8132547:8 - Dawen Xu, Shubing Su:
Separable Reversible Data Hiding in Encrypted Images Based on Difference Histogram Modification. 7480147:1-7480147:14 - Binrui Zhu, Jiameng Sun, Jing Qin, Jixin Ma:
A Secure Data Sharing Scheme with Designated Server. 4268731:1-4268731:16 - Harry Bartlett, Ed Dawson, Hassan Qahur Al Mahri, Md. Iftekhar Salam, Leonie Simpson, Kenneth Koon-Ho Wong:
Random Fault Attacks on a Class of Stream Ciphers. 1680263:1-1680263:12 - Jae Yeol Jeong, Ik Rae Jeong:
Efficient Cancelable Iris Template Generation for Wearable Sensors. 7473591:1-7473591:13 - Qinglan Zhao, Shuntong Yang, Dong Zheng, Baodong Qin:
A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things. 8105787:1-8105787:8 - Tao Wang, Bo Yang, Guoyong Qiu, Lina Zhang, Yong Yu, Yanwei Zhou, Juncai Guo:
An Approach Enabling Various Queries on Encrypted Industrial Data Stream. 6293970:1-6293970:12 - Zeeshan Ali Khan, Peter Herrmann:
Recent Advancements in Intrusion Detection Systems for the Internet of Things. 4301409:1-4301409:19 - Qihua Wang, Huaqun Wang, Yufeng Wang, Rui Guo:
A Distributed Access Control with Outsourced Computation in Fog Computing. 6782753:1-6782753:10 - Bo Feng, Qiang Li, Yuede Ji, Dong Guo, Xiangyu Meng:
Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users. 3053418:1-3053418:14 - Ashwag Albakri, Lein Harn, Sejun Song:
Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN). 3950129:1-3950129:11 - Markus Heinrich, Tsvetoslava Vateva-Gurova, Tolga Arul, Stefan Katzenbeisser, Neeraj Suri, Henk Birkholz, Andreas Fuchs, Christoph Krauß, Maria Zhdanova, Don Kuzhiyelil, Sergey Tverdyshev, Christian Schlehuber:
Security Requirements Engineering in Safety-Critical Railway Signalling Networks. 8348925:1-8348925:14 - Dan Lu, Qilong Han, Kejia Zhang, Haitao Zhang, Bisma Gull:
A Novel Method for Location Privacy Protection in LBS Applications. 1914038:1-1914038:11 - Jie Cai, Han Jiang, Pingyuan Zhang, Zhihua Zheng, Hao Wang, Guangshi Lü, Qiuliang Xu:
ID-Based Strong Designated Verifier Signature over ℛ-SIS Assumption. 9678095:1-9678095:8 - Zhuoqun Xia, Zhenwei Fang, Fengfei Zou, Jin Wang, Arun Kumar Sangaiah:
Research on Defensive Strategy of Real-Time Price Attack Based on Multiperson Zero-Determinant. 6956072:1-6956072:13