


default search action
EAI Endorsed Transactions on Security and Safety, Volume 6
Volume 6, Number 19, January 2019
- Naiwei Liu, Wanyu Zang, Songqing Chen, Meng Yu, Ravi S. Sandhu:

Adaptive Noise Injection against Side-Channel Attacks on ARM Platform. e1 - Vasileios Anastopoulos, Sokratis K. Katsikas:

A Methodology for the Dynamic Design of Adaptive Log Management Infrastructures. e2 - Rocio Lopez Perez, Florian Adamsky, Ridha Soua, Thomas Engel:

Forget the Myth of the Air Gap: Machine Learning for Reliable Intrusion Detection in SCADA Systems. e3 - Wei Zhang, Jingwen Zhao, Fengqiong Wei, Yunfang Chen:

Differentially Private High-Dimensional Data Publication via Markov Network. e4 - Yuzhe Richard Tang, Kai Li

, Katchaguy Areekijseree, Shuigeng Zhou, Liting Hu:
Privacy-Preserving Multi-Party Directory Services. e5
Volume 6, Number 20, April 2019
- Vinay Sachidananda, Suhas Bhairav, Yuval Elovici:

Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service. e1 - Weiqi Cui, Jiangmin Yu, Yanmin Gong

, Eric Chan-Tin:
Efficient, Effective, and Realistic Website Fingerprinting Mitigation. e2 - Anyi Liu, Selena Haidar, Yuan Cheng

, Yingjiu Li:
Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log. e3 - Hongfa Xue, Yurong Chen, Guru Venkataramani, Tian Lan:

AMASS: Automated Software Mass Customization via Feature Identification and Tailoring. e4 - Qiumao Ma, Wensheng Zhang:

Octopus ORAM: An Oblivious RAM with Communication and Server Storage Efficiency. e5
Volume 6, Number 21, August 2019
- Saeed Ibrahim Alqahtani, Shujun Li, Haiyue Yuan

, Patrice Rusconi:
Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? e1 - Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamouha:

Attacker Capability based Dynamic Deception Model for Large-Scale Networks. e2 - Yi Li, Kaiqi Xiong, Xiangyang Li:

Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur. e3 - Andrew Meyer, Sankardas Roy:

Do Metadata-based Deleted-File-Recovery (DFR) Tools Meet NIST Guidelines? e4 - Zhengping Luo, Zhe Qu, Tung Thanh Nguyen, Hui Zeng, Zhuo Lu:

Security of HPC Systems: From a Log-analyzing Perspective. e5
Volume 6, Number 22, 2020
- David Mohaisen, Sencun Zhu:

Editorial. e1 - Qais Tasali, Christine Sublett, Eugene Y. Vasserman

:
Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems. e2 - Yuxuan Chen, Xuejing Yuan, Aohui Wang, Kai Chen, Shengzhi Zhang, Heqing Huang:

Manipulating Users' Trust on Amazon Echo: Compromising Smart Home from Outside. e3 - Agbotiname Lucky Imoize, Boluwatife Samuel Ben-Adeola, John Adetunji Adebisi:

Development of a Multifactor-Security-Protocol System Using Ambient Noise Synthesis. e4 - Yifan Tian, Jiawei Yuan, Yantian Hou:

CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized k-d Forest. e5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














