


Остановите войну!
for scientists:


default search action
Security and Communication Networks, Volume 2019
Volume 2019, 2019
- Yubiao Wang
, Junhao Wen
, Xibin Wang
, Bamei Tao
, Wei Zhou:
A Cloud Service Trust Evaluation Model Based on Combining Weights and Gray Correlation Analysis. 2437062:1-2437062:11 - Shuang Zhao, Shuhui Chen
, Yipin Sun, Zhiping Cai
, Jinshu Su
:
Identifying Known and Unknown Mobile Application Traffic Using a Multilevel Classifier. 9595081:1-9595081:11 - Xiaoye Li
, Jing Yang
, Zhenlong Sun
, Jianpei Zhang
:
Differentially Private Release of the Distribution of Clustering Coefficients across Communities. 2518714:1-2518714:9 - Yuichi Komano
, Kazuo Ohta, Kazuo Sakiyama, Mitsugu Iwamoto, Ingrid Verbauwhede
:
Single-Round Pattern Matching Key Generation Using Physically Unclonable Function. 1719585:1-1719585:13 - Ángel Martín del Rey
, Lu-Xing Yang
, Vasileios Karyotis
:
Mathematical Models for Malware Propagation. 6046353:1-6046353:2 - Mohamed Ali Hajjaji
, Mohamed Gafsi
, Abdessalem Ben Abdelali
, Abdellatif Mtibaa
:
FPGA Implementation of Digital Images Watermarking System Based on Discrete Haar Wavelet Transform. 1294267:1-1294267:17 - Liran Ma
, Yan Huo
, Chunqiang Hu, Wei Li:
Security and Privacy for Smart Cyber-Physical Systems. 7045862:1-7045862:2 - Ming Xu
, Weili Han
:
An Explainable Password Strength Meter Addon via Textual Pattern Recognition. 5184643:1-5184643:10 - Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue
, Dingding Jia, Yamin Liu:
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy. 1816393:1-1816393:12 - Zhenjun Tang
, Ye Yang, Shijie Xu
, Chunqiang Yu
, Xianquan Zhang
:
Image Encryption with Double Spiral Scans and Chaotic Maps. 8694678:1-8694678:15 - Rashid Abbasi
, Lixiang Xu, Farhan Amin
, Bin Luo:
Efficient Lossless Compression Based Reversible Data Hiding Using Multilayered n-Bit Localization. 8981240:1-8981240:13 - Baodong Qin
:
Tightly Secure Lossy Trapdoor Functions: Constructions and Applications. 3636759:1-3636759:13 - Xu Wang
, Bo Song, Wei Ni
, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng:
Group-Based Susceptible-Infectious-Susceptible Model in Large-Scale Directed Networks. 1657164:1-1657164:9 - Yunxue Yan, Lei Wu
, Wenyu Xu, Hao Wang, Zhaoman Liu:
Integrity Audit of Shared Cloud Data with Identity Tracking. 1354346:1-1354346:11 - JingJing Wang
, Yiliang Han
, Xiaoyuan Yang
, Tanping Zhou
, Jiayong Chen:
A New Group Location Privacy-Preserving Method Based on Distributed Architecture in LBS. 2414687:1-2414687:14 - Yuntao Zhao
, Bo Bo, Yongxin Feng
, ChunYu Xu, Bo Yu:
A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning. 2674684:1-2674684:8 - Laurence T. Yang
, Wei Wang, Gregorio Martínez Pérez
, Willy Susilo
:
Security, Privacy, and Trust for Cyberphysical-Social Systems. 2964673:1-2964673:2 - Mishall Al-Zubaidie
, Zhongwei Zhang, Ji Zhang:
RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications. 3263902:1-3263902:26 - Viet Cuong Trinh
:
A Short Server-Aided Certificateless Aggregate Multisignature Scheme in the Standard Model. 3424890:1-3424890:14 - Wenli Shang
, Tianyu Gong, Chunyu Chen, Jing Hou, Peng Zeng
:
Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees. 3574675:1-3574675:11 - Dilara Acarali
, Muttukrishnan Rajarajan, Nikos Komninos
, Bruno Bogaz Zarpelão
:
Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks. 3745619:1-3745619:13 - Teng Hu
, Weina Niu
, Xiaosong Zhang
, Xiaolei Liu, Jiazhong Lu, Yuan Liu:
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning. 3898951:1-3898951:12 - Darong Huang
, Lanyan Ke
, Bo Mi, Guosheng Wei, Jian Wang, Shaohua Wan
:
A Cooperative Denoising Algorithm with Interactive Dynamic Adjustment Function for Security of Stacker in Industrial Internet of Things. 4049765:1-4049765:16 - Jian Sun
, Guanhua Huang, Arun Kumar Sangaiah
, Guangyang Zhu, Xiaojiang Du:
Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective. 4074272:1-4074272:15 - Toan-Thinh Truong
, Minh-Triet Tran
, Anh Duc Duong:
Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment. 4250743:1-4250743:11 - Yasuyuki Kawanishi, Hideaki Nishihara, Daisuke Souma, Hirotaka Yoshida
, Yoichi Hata:
A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design. 4614721:1-4614721:35 - Bin Ma
, Bing Li
, Xiao-Yu Wang
, Chunpeng Wang
, Jian Li
, Yun-Qing Shi:
Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image. 4732632:1-4732632:9 - Soultana Ellinidou
, Gaurav Sharma, Théo Rigas, Tristan Vanspouwen, Olivier Markowitch, Jean-Michel Dricot:
SSPSoC: A Secure SDN-Based Protocol over MPSoC. 4869167:1-4869167:11 - Krzysztof Cabaj
, Marcin Gregorczyk, Wojciech Mazurczyk
, Piotr Nowakowski
, Piotr Zórawski
:
Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System. 4930908:1-4930908:22 - Dhanu Dwiardhika
, Takuji Tachibana
:
Virtual Network Embedding Based on Security Level with VNF Placement. 5640134:1-5640134:11 - Jin Wook Byun
:
A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function. 5935292:1-5935292:15 - Han Zhang
, Yuanbo Guo, Tao Li:
Multifeature Named Entity Recognition in Information Security Based on Adversarial Learning. 6417407:1-6417407:9 - Marcin Luckner
:
Practical Web Spam Lifelong Machine Learning System with Automatic Adjustment to Current Lifecycle Phase. 6587020:1-6587020:16 - Maurantonio Caprolu
, Simone Raponi
, Roberto Di Pietro
:
FORTRESS: An Efficient and Distributed Firewall for Stateful Data Plane SDN. 6874592:1-6874592:16 - Guoyan Huang, Qian Wang, Xinqian Liu
, Xiaobing Hao, Huaizhi Yan:
Mining the Key Nodes from Software Network Based on Fault Accumulation and Propagation. 7140480:1-7140480:11 - Hyun-A. Park
:
Secure Information Sharing System for Online Patient Networks. 7541269:1-7541269:16 - Haiying Ma
, Zhanjun Wang
, Zhijin Guan
:
Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation. 8093578:1-8093578:11 - Édgar Salguero Dorokhin
, Walter Fuertes
, Edison Lascano
:
On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key. 8214681:1-8214681:10 - Wenting Shen, Jing Qin
, Jixin Ma
:
A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment. 8275074:1-8275074:15 - Yong-Seok Lee, Young-Ho Seo
, Dong-Wook Kim
:
Blind Image Watermarking Based on Adaptive Data Spreading in n-Level DWT Subbands. 8357251:1-8357251:11 - Jiadong Ren, Zhangqi Zheng
, Qian Liu, Zhiyao Wei, Huaizhi Yan:
A Buffer Overflow Prediction Approach Based on Software Metrics and Machine Learning. 8391425:1-8391425:13 - Meiyu Zhang
, Qianying Zhang
, Shijun Zhao, Zhiping Shi
, Yong Guan:
SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks. 8690853:1-8690853:12 - Fute Shang
, Buhong Wang
, Fuhu Yan, Tengyao Li
:
Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems. 8936784:1-8936784:11 - Gustav Sourek
, Filip Zelezný
:
Efficient Extraction of Network Event Types from NetFlows. 8954914:1-8954914:18 - Mingfu Xue
, Chengxiang Yuan, Zhe Liu, Jian Wang
:
SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations. 9795621:1-9795621:18 - Yu Zhou
, Yongzhuang Wei, Fengrong Zhang:
Measuring the Sum-of-Squares Indicator of Boolean Functions in Encryption Algorithm for Internet of Things. 1348639:1-1348639:15 - Joseph I. Choi
, Kevin R. B. Butler
:
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities. 1368905:1-1368905:28 - Vasyl Ustimenko
, Urszula Romanczuk-Polubiec
, Aneta Wróblewska
, Monika Katarzyna Polak, Eustrat Zhupa:
On the Constructions of New Symmetric Ciphers Based on Nonbijective Multivariate Maps of Prescribed Degree. 2137561:1-2137561:15 - Hefeng Chen
, Chin-Chen Chang
:
A Novel (t, n) Secret Sharing Scheme Based upon Euler's Theorem. 2387358:1-2387358:7 - Haitao Song
, Guangming Tang
, Yifeng Sun
, Zhanzhan Gao
:
Security Measure for Image Steganography Based on High Dimensional KL Divergence. 3546367:1-3546367:13 - SeokHwan Choi
, Jin-Myeong Shin
, Yoon-Ho Choi
:
Dynamic Nonparametric Random Forest Using Covariance. 3984031:1-3984031:12 - Nelson Ochieng
, Waweru Mwangi, Ismail Ateya
:
Optimizing Computer Worm Detection Using Ensembles. 4656480:1-4656480:10 - Yuntao Zhao
, ChunYu Xu, Bo Bo, Yongxin Feng
:
MalDeep: A Deep Learning Classification Framework against Malware Variants Based on Texture Visualization. 4895984:1-4895984:11 - Wenjie Liu
, Peipei Gao, Zhihao Liu, Hanwu Chen, Maojun Zhang
:
A Quantum-Based Database Query Scheme for Privacy Preservation in Cloud Environment. 4923590:1-4923590:14 - Jieren Cheng
, Mengyang Li
, Xiangyan Tang
, Victor S. Sheng
, Yifu Liu
, Wei Guo
:
Corrigendum to "Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing". 6809054:1 - Kevser Ovaz Akpinar
, Ibrahim Özçelik
:
Corrigendum to "Development of the ECAT Preprocessor with the Trust Communication Approach". 7457154:1 - Zhaoqing Pan
, Ching-Nung Yang, Victor S. Sheng
, Naixue Xiong
, Weizhi Meng
:
Machine Learning for Wireless Multimedia Data Security. 7682306:1-7682306:2 - Tran Khanh Dang
, Khanh T. K. Tran
:
The Meeting of Acquaintances: A Cost-Efficient Authentication Scheme for Light-Weight Objects with Transient Trust Level and Plurality Approach. 8123259:1-8123259:18 - Mahmoud Abu-Zant, Adwan Yasin
:
Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV). 8249108:1-8249108:12 - Young-Seob Jeong
, Jiyoung Woo
, Ah Reum Kang
:
Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks. 8485365:1-8485365:9 - Lei He, Jianfeng Ma
, Ruo Mo
, Dawei Wei:
Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing. 8583130:1-8583130:12 - Junhyoung Oh
, Ukjin Lee, Kyungho Lee
:
Usability Evaluation Model for Biometric System considering Privacy Concern Based on MCDM Model. 8715264:1-8715264:14 - Tianbo Lu
, Ting Meng, Chao Li
, Guozhen Dong, Huiyang Li, Jiao Zhang
, Xiaoyan Zhang:
MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication. 9078176:1-9078176:15 - Federica Lago
, Quoc-Tin Phan, Giulia Boato:
Visual and Textual Analysis for Image Trustworthiness Assessment within Online News. 9236910:1-9236910:14 - Yinqiao Xiong
, Peidong Zhu
, Zhizhu Liu, Hui Yin
, Tiantian Deng:
EPLC: An Efficient Privacy-Preserving Line-Loss Calculation Scheme for Residential Areas of Smart Grid. 9637578:1-9637578:14 - Hoang-Nam Pham-Nguyen
, Quang Tran Minh
:
Dynamic Resource Provisioning on Fog Landscapes. 1798391:1-1798391:15 - Amirreza Niakanlahiji
, Jafar Haadi Jafarian
:
WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense. 2156906:1-2156906:13 - Ping Wang
, Bin Li, Hongjin Shi, Yaosheng Shen, Ding Wang
:
Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments. 2516963:1-2516963:13 - Yujiao Song, Hao Wang
, Xiaochao Wei, Lei Wu
:
Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud. 3249726:1-3249726:9 - Xuyun Zhang
, Yuan Yuan, Zhili Zhou, Shancang Li, Lianyong Qi
, Deepak Puthal:
Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things. 4529757:1-4529757:4 - Baosheng Wang, Yi Wang
, Rongmao Chen
:
A Practical Authentication Framework for VANETs. 4752612:1-4752612:11 - Libing Wu
, Jing Wang, Sherali Zeadally, Debiao He
:
Anonymous and Efficient Message Authentication Scheme for Smart Grid. 4836016:1-4836016:12 - E. Munivel
, Kannammal Annadurai:
New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing. 5141395:1-5141395:11 - Yu Zhang
, Yin Li
, Yifan Wang:
Secure and Efficient Searchable Public Key Encryption for Resource Constrained Environment Based on Pairings under Prime Order Group. 5280806:1-5280806:14 - Leila Khatibzadeh
, Zarrintaj Bornaee
, Abbas Ghaemi Bafghi:
Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic. 5306395:1-5306395:11 - Mohamed Amine Ferrag
, Leandros A. Maglaras
, Abdelouahid Derhab
:
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends. 5452870:1-5452870:20 - Ankang Ju
, Yuanbo Guo, Ziwei Ye
, Tao Li, Jing Ma:
HeteMSD: A Big Data Analytics Framework for Targeted Cyber-Attacks Detection Using Heterogeneous Multisource Data. 5483918:1-5483918:9 - Ye Yuan
, Liji Wu
, Yijun Yang
, Xiangmin Zhang:
Erratum to "A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism". 5742308:1-5742308:2 - Jizhi Wang
:
The Prediction of Serial Number in OpenSSL's X.509 Certificate. 6013846:1-6013846:11 - Hala Abu Dhailah
, Eyad Taqieddin
, Abdallah Y. Alma'aitah
:
An Enhanced and Resource-Aware RFID Multitag Grouping Protocol. 6862052:1-6862052:15 - Jiaji Pan, Yi-Ning Liu
, Weiming Zhang
:
Detection of Dummy Trajectories Using Convolutional Neural Networks. 8431074:1-8431074:12 - Rui Zhu
, Li Xu
, Yali Zeng, Xun Yi:
Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification. 9126376:1-9126376:12 - Neline van Ginkel
, Willem De Groef, Fabio Massacci
, Frank Piessens:
A Server-Side JavaScript Security Architecture for Secure Integration of Third-Party Libraries. 9629034:1-9629034:21 - Peyman Jafary
, Antti Supponen, Mikko Salmenperä, Sami Repo
:
Analyzing Reliability of the Communication for Secure and Highly Available GOOSE-Based Logic Selectivity. 9682189:1-9682189:16 - Hojoong Park
, Yongjin Yeom
, Ju-Sung Kang
:
A Lightweight BCH Code Corrector of TRNG with Measurable Dependence. 9684239:1-9684239:11 - Qian Lu
, Haipeng Qu
, Yuzhan Ouyang
, Jiahui Zhang
:
SLFAT: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames. 2718741:1-2718741:10 - Sanghoon Lee, Ik Rae Jeong
:
A Cancelable Template for the Low-Quality Fingerprints from Wearable Devices. 4202671:1-4202671:8 - Quanbo Qu
, Baocang Wang
, Yuan Ping
, Zhili Zhang
:
Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme. 8319508:1-8319508:6 - Mengxia Shuai
, Bin Liu, Nenghai Yu
, Ling Xiong
:
Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks. 8145087:1-8145087:14 - Yong Xie, Songsong Zhang, Xiang Li, Yanggui Li
, Yuan Chai:
CasCP: Efficient and Secure Certificateless Authentication Scheme for Wireless Body Area Networks with Conditional Privacy-Preserving. 5860286:1-5860286:13 - Yu Zhan
, Baocang Wang
:
Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network. 6059834:1-6059834:5 - Kaifan Huang
, Pengdeng Li, Lu-Xing Yang
, Xiaofan Yang
, Yuan Yan Tang
:
Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach. 2315627:1-2315627:12 - Wei Bai
, Zhisong Pan
, Shize Guo, Zhe Chen:
RMMDI: A Novel Framework for Role Mining Based on the Multi-Domain Information. 8085303:1-8085303:15 - Yu Liu
, Xiaolei Liu
, Yanmin Zhao:
Security Cryptanalysis of NUX for the Internet of Things. 2062697:1-2062697:12 - Jiazhong Lu, Fengmao Lv
, Zhongliu Zhuo, Xiaosong Zhang
, Xiaolei Liu, Teng Hu
, Wei Deng
:
Integrating Traffics with Network Device Logs for Anomaly Detection. 5695021:1-5695021:10 - Jiadong Ren, Jiawei Guo, Qian Wang, Huang Yuan
, Hao Xiaobing
, Hu Jingjing:
Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms. 7130868:1-7130868:11 - Hisham A. Kholidy
, Abdelkarim Erradi:
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems. 6816943:1-6816943:15 - Wei Sun
, Hao Zhang, Li-jun Cai, Ai-min Yu, Jinqiao Shi, Jian-Guo Jiang:
A Novel Device Identification Method Based on Passive Measurement. 6045251:1-6045251:11 - Thein Than Thwin
, Sangsuree Vasupongayya
:
Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems. 8315614:1-8315614:15 - Feifei Wang
, Guoai Xu
, Chenyu Wang
, Junhao Peng:
A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment. 2838615:1-2838615:15 - Chao Yang
, Junwei Zhang
, Jingjing Guo
, Yu Zheng, Li Yang, Jianfeng Ma
:
Fingerprint Protected Password Authentication Protocol. 1694702:1-1694702:12 - Chenghai Li, Fangzheng Zhao
, Chen Liu, Lei Lei, Jie Zhang
:
A Hyperchaotic Color Image Encryption Algorithm and Security Analysis. 8132547:1-8132547:8 - Dawen Xu
, Shubing Su:
Separable Reversible Data Hiding in Encrypted Images Based on Difference Histogram Modification. 7480147:1-7480147:14 - Binrui Zhu, Jiameng Sun
, Jing Qin
, Jixin Ma
:
A Secure Data Sharing Scheme with Designated Server. 4268731:1-4268731:16 - Harry Bartlett
, Ed Dawson, Hassan Qahur Al Mahri, Md. Iftekhar Salam
, Leonie Simpson
, Kenneth Koon-Ho Wong
:
Random Fault Attacks on a Class of Stream Ciphers. 1680263:1-1680263:12 - Jaeyeol Jeong, Ik Rae Jeong
:
Efficient Cancelable Iris Template Generation for Wearable Sensors. 7473591:1-7473591:13 - Qinglan Zhao, Shuntong Yang, Dong Zheng
, Baodong Qin
:
A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things. 8105787:1-8105787:8 - Tao Wang
, Bo Yang
, Guoyong Qiu, Lina Zhang
, Yong Yu, Yanwei Zhou
, Juncai Guo
:
An Approach Enabling Various Queries on Encrypted Industrial Data Stream. 6293970:1-6293970:12 - Zeeshan Ali Khan
, Peter Herrmann
:
Recent Advancements in Intrusion Detection Systems for the Internet of Things. 4301409:1-4301409:19 - Qihua Wang
, Huaqun Wang
, Yufeng Wang, Rui Guo:
A Distributed Access Control with Outsourced Computation in Fog Computing. 6782753:1-6782753:10 - Bo Feng, Qiang Li
, Yuede Ji
, Dong Guo
, Xiangyu Meng
:
Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users. 3053418:1-3053418:14 - Ashwag Albakri
, Lein Harn, Sejun Song:
Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN). 3950129:1-3950129:11 - Markus Heinrich
, Tsvetoslava Vateva-Gurova, Tolga Arul
, Stefan Katzenbeisser, Neeraj Suri
, Henk Birkholz, Andreas Fuchs, Christoph Krauß
, Maria Zhdanova
, Don Kuzhiyelil, Sergey Tverdyshev, Christian Schlehuber:
Security Requirements Engineering in Safety-Critical Railway Signalling Networks. 8348925:1-8348925:14 - Dan Lu
, Qilong Han
, Kejia Zhang
, Haitao Zhang, Bisma Gull:
A Novel Method for Location Privacy Protection in LBS Applications. 1914038:1-1914038:11 - Jie Cai
, Han Jiang
, Pingyuan Zhang
, Zhihua Zheng, Hao Wang
, Guangshi Lü, Qiuliang Xu: