


default search action
EAI Endorsed Transactions on Security and Safety, Volume 8
Volume 8, Number 27, 2021
- Tomasz Kosinski, Riccardo Scandariato, Morten Fjeld:

SyntIoT: Privacy and security experimentation in consumer-oriented IoT ecosystems. e1 - Qiuqing Jin, Liming Wang:

Zero-Trust Based Distributed Collaborative Dynamic Access Control Scheme with Deep Multi-Agent Reinforcement Learning. e2 - Philip Dale Huff, Qinghua Li:

Towards Automating the Assessment of Software Vulnerability Risk. e3 - Guanxiong Ha, Hang Chen, Ruiqi Li, Wei Shao, Chunfu Jia:

A Rekeying Scheme for Encrypted Deduplication Storage based on NTRU. e4 - Shiying Pan, Can Yang, Runmin Li:

GIP3: Make Privacy Preserving be Easier on Cloud. e5
Volume 8, Number 28, 2021
- Anna Bakas, Anne Wagner, Spencer Johnston, Shelia Kennison, Eric Chan-Tin:

Impact of Personality Types and Matching Messaging on Password Strength. e1 - Hong Liu, Eugene Y. Vasserman:

Side-channel Programming for Software Integrity Checking. e2 - Zheyuan Liu, Rui Zhang:

Privacy Preserving Collaborative Machine Learning. e3 - Mohammad Ashiqur Rahman, Amarjit Datta, Ehab Al-Shaer:

Automated Configuration Synthesis for Resilient Smart Metering Infrastructure. e4 - Kamrul Hasan, Sachin Shetty, Sharif Ullah

, Amin Hassanzadeh, Tariqul Islam:
Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems. e5
Volume 8, Number 29, 2021
- Zhengping Luo, Tao Hou, Xiangrong Zhou, Hui Zeng, Zhuo Lu:

Binary Code Similarity Detection through LSTM and Siamese Neural Network. e1 - Prabesh Pathak, Prabesh Poudel, Sankardas Roy, Doina Caragea:

Leveraging attention-based deep neural networks for security vetting of Android applications. e2 - Hela Mliki

, Abir Hadj Kaceam, Lamia Chaari:
A Comprehensive Survey on Intrusion Detection based Machine Learning for IoT Networks. e3 - Zezhang Yang, Jian Li, Ping Yang:

FedADMP: A Joint Anomaly Detection and Mobility Prediction Framework via Federated Learning. e4 - Joshua Bassey, Xiangfang Li, Lijun Qian:

Device Authentication Codes based on RF Fingerprinting using Deep Learning. e5
Volume 8, Number 30, 2022
- Adeel A. Malik, Deepak K. Tosh:

Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems. 1 - Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin:

Comparing Online Surveys for Cybersecurity: SONA and MTurk. 2 - Yang Lu

, Shujun Li, Alex Alves Freitas
, Athina Ioannou
:
How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis. 3 - Zhen Huang

, Gang Tan, Xiaowei Yu:
Mitigating Vulnerabilities in Closed Source Software. 4 - Muhammad Shoaib Akhtar, Tao Feng:

A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers. 5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














