default search action
Search dblp for Publications
export results for "stream:journals/sesa:"
@article{DBLP:journals/sesa/AkhtarF22, author = {Muhammad Shoaib Akhtar and Tao Feng}, title = {A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over {IOT} Layers}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {30}, pages = {5}, year = {2022}, url = {https://doi.org/10.4108/eetss.v8i30.590}, doi = {10.4108/EETSS.V8I30.590}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/AkhtarF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HuangTY22, author = {Zhen Huang and Gang Tan and Xiaowei Yu}, title = {Mitigating Vulnerabilities in Closed Source Software}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {30}, pages = {4}, year = {2022}, url = {https://doi.org/10.4108/eetss.v8i30.253}, doi = {10.4108/EETSS.V8I30.253}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/HuangTY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LuLFI22, author = {Yang Lu and Shujun Li and Alex Alves Freitas and Athina Ioannou}, title = {How data-sharing nudges influence people's privacy preferences: {A} machine learning-based analysis}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {30}, pages = {3}, year = {2022}, url = {https://doi.org/10.4108/eai.21-12-2021.172440}, doi = {10.4108/EAI.21-12-2021.172440}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/LuLFI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MalikT22, author = {Adeel A. Malik and Deepak K. Tosh}, title = {Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {30}, pages = {1}, year = {2022}, url = {https://doi.org/10.4108/eai.25-1-2022.172997}, doi = {10.4108/EAI.25-1-2022.172997}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/MalikT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/WagnerBKC22, author = {Anne Wagner and Anna Bakas and Shelia Kennison and Eric Chan{-}Tin}, title = {Comparing Online Surveys for Cybersecurity: {SONA} and MTurk}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {30}, pages = {2}, year = {2022}, url = {https://doi.org/10.4108/eai.8-2-2022.173334}, doi = {10.4108/EAI.8-2-2022.173334}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/WagnerBKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/Al-WadiA21, author = {Mazen Al{-}Wadi and Amro Awad}, title = {Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {24}, pages = {e1}, year = {2021}, url = {https://doi.org/10.4108/eai.13-7-2018.165516}, doi = {10.4108/EAI.13-7-2018.165516}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/Al-WadiA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/BakasWJKC21, author = {Anna Bakas and Anne Wagner and Spencer Johnston and Shelia Kennison and Eric Chan{-}Tin}, title = {Impact of Personality Types and Matching Messaging on Password Strength}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {28}, pages = {e1}, year = {2021}, url = {https://doi.org/10.4108/eai.1-6-2021.170012}, doi = {10.4108/EAI.1-6-2021.170012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/BakasWJKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/BasseyLQ21, author = {Joshua Bassey and Xiangfang Li and Lijun Qian}, title = {Device Authentication Codes based on {RF} Fingerprinting using Deep Learning}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {29}, pages = {e5}, year = {2021}, url = {https://doi.org/10.4108/eai.30-11-2021.172305}, doi = {10.4108/EAI.30-11-2021.172305}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/BasseyLQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HaCLSJ21, author = {Guanxiong Ha and Hang Chen and Ruiqi Li and Wei Shao and Chunfu Jia}, title = {A Rekeying Scheme for Encrypted Deduplication Storage based on {NTRU}}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {27}, pages = {e4}, year = {2021}, url = {https://doi.org/10.4108/eai.25-6-2021.170248}, doi = {10.4108/EAI.25-6-2021.170248}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/HaCLSJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HasanSUHI21, author = {Kamrul Hasan and Sachin Shetty and Sharif Ullah and Amin Hassanzadeh and Tariqul Islam}, title = {Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {28}, pages = {e5}, year = {2021}, url = {https://doi.org/10.4108/eai.10-9-2021.170949}, doi = {10.4108/EAI.10-9-2021.170949}, timestamp = {Wed, 02 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/HasanSUHI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HuffL21, author = {Philip Dale Huff and Qinghua Li}, title = {Towards Automating the Assessment of Software Vulnerability Risk}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {27}, pages = {e3}, year = {2021}, url = {https://doi.org/10.4108/eai.25-6-2021.170247}, doi = {10.4108/EAI.25-6-2021.170247}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/HuffL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/JinW21, author = {Qiuqing Jin and Liming Wang}, title = {Zero-Trust Based Distributed Collaborative Dynamic Access Control Scheme with Deep Multi-Agent Reinforcement Learning}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {27}, pages = {e2}, year = {2021}, url = {https://doi.org/10.4108/eai.25-6-2021.170246}, doi = {10.4108/EAI.25-6-2021.170246}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/JinW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/KosinskiSF21, author = {Tomasz Kosinski and Riccardo Scandariato and Morten Fjeld}, title = {SyntIoT: Privacy and security experimentation in consumer-oriented IoT ecosystems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {27}, pages = {e1}, year = {2021}, url = {https://doi.org/10.4108/eai.25-6-2021.170245}, doi = {10.4108/EAI.25-6-2021.170245}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/KosinskiSF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LiuV21, author = {Hong Liu and Eugene Y. Vasserman}, title = {Side-channel Programming for Software Integrity Checking}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {28}, pages = {e2}, year = {2021}, url = {https://doi.org/10.4108/eai.2-6-2021.170013}, doi = {10.4108/EAI.2-6-2021.170013}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/LiuV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LiuZ21, author = {Zheyuan Liu and Rui Zhang}, title = {Privacy Preserving Collaborative Machine Learning}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {28}, pages = {e3}, year = {2021}, url = {https://doi.org/10.4108/eai.14-7-2021.170295}, doi = {10.4108/EAI.14-7-2021.170295}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/LiuZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LiuZHF21, author = {Wanping Liu and Zhoulan Zhang and Cheng Huang and Yong Fang}, title = {CLETer: {A} Character-level Evasion Technique Against Deep Learning {DGA} Classifiers}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {24}, pages = {e5}, year = {2021}, url = {https://doi.org/10.4108/eai.18-2-2021.168723}, doi = {10.4108/EAI.18-2-2021.168723}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/LiuZHF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LuoHZZL21, author = {Zhengping Luo and Tao Hou and Xiangrong Zhou and Hui Zeng and Zhuo Lu}, title = {Binary Code Similarity Detection through {LSTM} and Siamese Neural Network}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {29}, pages = {e1}, year = {2021}, url = {https://doi.org/10.4108/eai.14-9-2021.170956}, doi = {10.4108/EAI.14-9-2021.170956}, timestamp = {Mon, 19 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/LuoHZZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MlikiKC21, author = {Hela Mliki and Abir Hadj Kaceam and Lamia Chaari}, title = {A Comprehensive Survey on Intrusion Detection based Machine Learning for IoT Networks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {29}, pages = {e3}, year = {2021}, url = {https://doi.org/10.4108/eai.6-10-2021.171246}, doi = {10.4108/EAI.6-10-2021.171246}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/MlikiKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/NagothuCAB21, author = {Deeraj Nagothu and Yu Chen and Alexander J. Aved and Erik Blasch}, title = {Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {24}, pages = {e4}, year = {2021}, url = {https://doi.org/10.4108/eai.4-2-2021.168648}, doi = {10.4108/EAI.4-2-2021.168648}, timestamp = {Fri, 12 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/NagothuCAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/PanYL21, author = {Shiying Pan and Can Yang and Runmin Li}, title = {{GIP3:} Make Privacy Preserving be Easier on Cloud}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {27}, pages = {e5}, year = {2021}, url = {https://doi.org/10.4108/eai.25-6-2021.170249}, doi = {10.4108/EAI.25-6-2021.170249}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/PanYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/PathakPRC21, author = {Prabesh Pathak and Prabesh Poudel and Sankardas Roy and Doina Caragea}, title = {Leveraging attention-based deep neural networks for security vetting of Android applications}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {29}, pages = {e2}, year = {2021}, url = {https://doi.org/10.4108/eai.27-9-2021.171168}, doi = {10.4108/EAI.27-9-2021.171168}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/PathakPRC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/RahmanDA21, author = {Mohammad Ashiqur Rahman and Amarjit Datta and Ehab Al{-}Shaer}, title = {Automated Configuration Synthesis for Resilient Smart Metering Infrastructure}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {28}, pages = {e4}, year = {2021}, url = {https://doi.org/10.4108/eai.10-9-2021.170948}, doi = {10.4108/EAI.10-9-2021.170948}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/RahmanDA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/SaqibGZM21, author = {Najmudin Saqib and Vasileios Germanos and Wen Zeng and Leandros Maglaras}, title = {Mapping of the Security Requirements of {GDPR} and {NISD}}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {24}, pages = {e2}, year = {2021}, url = {https://doi.org/10.4108/eai.30-6-2020.166283}, doi = {10.4108/EAI.30-6-2020.166283}, timestamp = {Fri, 12 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/SaqibGZM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/XiaSZRS21, author = {Tianrou Xia and Yuanyi Sun and Sencun Zhu and Zeeshan Rasheed and Khurram Shafique}, title = {Toward {A} Network-Assisted Approach for Effective Ransomware Detection}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {24}, pages = {e3}, year = {2021}, url = {https://doi.org/10.4108/eai.28-1-2021.168506}, doi = {10.4108/EAI.28-1-2021.168506}, timestamp = {Fri, 12 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/XiaSZRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/YangLY21, author = {Zezhang Yang and Jian Li and Ping Yang}, title = {FedADMP: {A} Joint Anomaly Detection and Mobility Prediction Framework via Federated Learning}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {29}, pages = {e4}, year = {2021}, url = {https://doi.org/10.4108/eai.21-10-2021.171595}, doi = {10.4108/EAI.21-10-2021.171595}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/YangLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/AnwarKCACSNM20, author = {Afsah Anwar and Aminollah Khormali and Jinchun Choi and Hisham Alasmary and Saeed Salem and DaeHun Nyang and David Mohaisen}, title = {Measuring the Cost of Software Vulnerabilities}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {23}, pages = {e1}, year = {2020}, url = {https://doi.org/10.4108/eai.13-7-2018.164551}, doi = {10.4108/EAI.13-7-2018.164551}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/AnwarKCACSNM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/AzharW20, author = {M. A. Hannan Bin Azhar and Robert Vause Whitehead}, title = {A study of user experiences and network analysis on anonymity and traceability of bitcoin transactions}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {25}, pages = {e3}, year = {2020}, url = {https://doi.org/10.4108/eai.30-4-2021.169577}, doi = {10.4108/EAI.30-4-2021.169577}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/AzharW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/BashirJZ20, author = {Reem Bashir and Helge Janicke and Wen Zeng}, title = {Evaluating the Impact of Sandbox Applications on Live Digital Forensics Investigation}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {25}, pages = {e2}, year = {2020}, url = {https://doi.org/10.4108/eai.8-4-2021.169179}, doi = {10.4108/EAI.8-4-2021.169179}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/BashirJZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ChenYWCZH20, author = {Yuxuan Chen and Xuejing Yuan and Aohui Wang and Kai Chen and Shengzhi Zhang and Heqing Huang}, title = {Manipulating Users' Trust on Amazon Echo: Compromising Smart Home from Outside}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {22}, pages = {e3}, year = {2020}, url = {https://doi.org/10.4108/eai.13-7-2018.163924}, doi = {10.4108/EAI.13-7-2018.163924}, timestamp = {Tue, 28 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/ChenYWCZH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/FitwiYNC20, author = {Alem Fitwi and Meng Yuan and Seyed Yahya Nikouei and Yu Chen}, title = {Minor Privacy Protection by Real-time Children Identification and Face Scrambling at the Edge}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {23}, pages = {e3}, year = {2020}, url = {https://doi.org/10.4108/eai.13-7-2018.164560}, doi = {10.4108/EAI.13-7-2018.164560}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/FitwiYNC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HanX20, author = {Chunling Han and Rui Xue}, title = {Aggregation for Privately Trained Different Types of Local Models}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {26}, pages = {e2}, year = {2020}, url = {https://doi.org/10.4108/eai.21-6-2021.170237}, doi = {10.4108/EAI.21-6-2021.170237}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/HanX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HeWSZ20, author = {Yuan He and Wengjie Wang and Hongyu Sun and Yuqing Zhang}, title = {Vul-Mirror: {A} Few-Shot Learning Method for Discovering Vulnerable Code Clone}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {23}, pages = {e4}, year = {2020}, url = {https://doi.org/10.4108/eai.13-7-2018.165275}, doi = {10.4108/EAI.13-7-2018.165275}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/HeWSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/IkueroGBZ20, author = {Friday Ehi Ikuero and Vasileios Germanos and Laurence Brooks and Wen Zeng}, title = {Is E-voting Systems based on Blockchain Technology Efficient in Nigeria General Elections?}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {25}, pages = {e1}, year = {2020}, url = {https://doi.org/10.4108/eai.10-3-2021.168964}, doi = {10.4108/EAI.10-3-2021.168964}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/IkueroGBZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ImoizeBA20, author = {Agbotiname Lucky Imoize and Boluwatife Samuel Ben{-}Adeola and John Adetunji Adebisi}, title = {Development of a Multifactor-Security-Protocol System Using Ambient Noise Synthesis}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {22}, pages = {e4}, year = {2020}, url = {https://doi.org/10.4108/eai.13-7-2018.163979}, doi = {10.4108/EAI.13-7-2018.163979}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/ImoizeBA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LiLTCO20, author = {Lanhang Li and Yuling Luo and Shubin Tang and Lvchen Cao and Xue Ouyang}, title = {Image encryption algorithm using chaotic maps and cellular automata}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {26}, pages = {e3}, year = {2020}, url = {https://doi.org/10.4108/eai.21-6-2021.170238}, doi = {10.4108/EAI.21-6-2021.170238}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/LiLTCO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LiWYXL20, author = {Yixin Li and Liming Wang and Jing Yang and Zhen Xu and Xi Luo}, title = {deMSF: a Method for Detecting Malicious Server Flocks for Same Campaign}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {26}, pages = {e1}, year = {2020}, url = {https://doi.org/10.4108/eai.21-6-2021.170236}, doi = {10.4108/EAI.21-6-2021.170236}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/LiWYXL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/Liu20, author = {Yan Liu}, title = {User Identity Linkage Method Based on User Online Habit}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {26}, pages = {e5}, year = {2020}, url = {https://doi.org/10.4108/eai.22-6-2021.170240}, doi = {10.4108/EAI.22-6-2021.170240}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/Liu20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MohaisenZ20, author = {David Mohaisen and Sencun Zhu}, title = {Editorial}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {22}, pages = {e1}, year = {2020}, url = {https://doi.org/10.4108/eai.18-5-2020.164587}, doi = {10.4108/EAI.18-5-2020.164587}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/MohaisenZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ParkKPK20, author = {SooHyun Park and Yeongeun Kang and Jeman Park and Joongheon Kim}, title = {Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {23}, pages = {e5}, year = {2020}, url = {https://doi.org/10.4108/eai.30-6-2020.165502}, doi = {10.4108/EAI.30-6-2020.165502}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/ParkKPK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/SunWFSZ20, author = {Mingxin Sun and Wenjie Wang and Hantao Feng and Hongu Sun and Yuqing Zhang}, title = {Identify Vulnerability Fix Commits Automatically Using Hierarchical Attention Network}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {23}, pages = {e2}, year = {2020}, url = {https://doi.org/10.4108/eai.13-7-2018.164552}, doi = {10.4108/EAI.13-7-2018.164552}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/SunWFSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/TasaliSV20, author = {Qais Tasali and Christine Sublett and Eugene Y. Vasserman}, title = {Controlled {BTG:} Toward Flexible Emergency Override in Interoperable Medical Systems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {22}, pages = {e2}, year = {2020}, url = {https://doi.org/10.4108/eai.13-7-2018.163213}, doi = {10.4108/EAI.13-7-2018.163213}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/TasaliSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/TianYH20, author = {Yifan Tian and Jiawei Yuan and Yantian Hou}, title = {{CPAR:} Cloud-Assisted Privacy-preserving Image Annotation with Randomized k-d Forest}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {22}, pages = {e5}, year = {2020}, url = {https://doi.org/10.4108/eai.13-7-2018.163999}, doi = {10.4108/EAI.13-7-2018.163999}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/TianYH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/Trieu-DoGXXF20, author = {Van Trieu{-}Do and Richard Garcia{-}Lebron and Maochao Xu and Shouhuai Xu and Yusheng Feng}, title = {Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {25}, pages = {e4}, year = {2020}, url = {https://doi.org/10.4108/eai.11-5-2021.169912}, doi = {10.4108/EAI.11-5-2021.169912}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/Trieu-DoGXXF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/Wang20, author = {Li Wang}, title = {Shoal: {A} Network Level Moving Target Defense Engine with Software Defined Networking}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {25}, pages = {e5}, year = {2020}, url = {https://doi.org/10.4108/eai.1-6-2021.170011}, doi = {10.4108/EAI.1-6-2021.170011}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/Wang20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ZhangW20, author = {Jing Zhang and Yu Wen}, title = {Malware Detection Based on Opcode Dynamic Analysis}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {26}, pages = {e4}, year = {2020}, url = {https://doi.org/10.4108/eai.22-6-2021.170239}, doi = {10.4108/EAI.22-6-2021.170239}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/ZhangW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/AlhebaishiWS19, author = {Nawaf Alhebaishi and Lingyu Wang and Anoop Singhal}, title = {Threat Modeling for Cloud Infrastructures}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {17}, pages = {e5}, year = {2019}, url = {https://doi.org/10.4108/eai.10-1-2019.156246}, doi = {10.4108/EAI.10-1-2019.156246}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/AlhebaishiWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/AlqahtaniLYR19, author = {Saeed Ibrahim Alqahtani and Shujun Li and Haiyue Yuan and Patrice Rusconi}, title = {Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More?}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {21}, pages = {e1}, year = {2019}, url = {https://doi.org/10.4108/eai.13-7-2018.162797}, doi = {10.4108/EAI.13-7-2018.162797}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/AlqahtaniLYR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/AminSNTK19, author = {Md Ali Reza Al Amin and Sachin Shetty and Laurent Njilla and Deepak K. Tosh and Charles Kamouha}, title = {Attacker Capability based Dynamic Deception Model for Large-Scale Networks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {21}, pages = {e2}, year = {2019}, url = {https://doi.org/10.4108/eai.13-7-2018.162808}, doi = {10.4108/EAI.13-7-2018.162808}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/AminSNTK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/AnastopoulosK19, author = {Vasileios Anastopoulos and Sokratis K. Katsikas}, title = {A Methodology for the Dynamic Design of Adaptive Log Management Infrastructures}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {19}, pages = {e2}, year = {2019}, url = {https://doi.org/10.4108/eai.25-1-2019.159347}, doi = {10.4108/EAI.25-1-2019.159347}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/AnastopoulosK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/CuiYGC19, author = {Weiqi Cui and Jiangmin Yu and Yanmin Gong and Eric Chan{-}Tin}, title = {Efficient, Effective, and Realistic Website Fingerprinting Mitigation}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {20}, pages = {e2}, year = {2019}, url = {https://doi.org/10.4108/eai.29-1-2019.161977}, doi = {10.4108/EAI.29-1-2019.161977}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/CuiYGC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/Gountia19, author = {Debasis Gountia}, title = {Towards Scalability Trade-off and Security Issues in State-of-the-art Blockchain}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {18}, pages = {e4}, year = {2019}, url = {https://doi.org/10.4108/eai.8-4-2019.157416}, doi = {10.4108/EAI.8-4-2019.157416}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/Gountia19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HeHC19, author = {Xianmang He and Yuan Hong and Yindong Chen}, title = {Exploring the Privacy Bound for Differential Privacy: From Theory to Practice}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {18}, pages = {e2}, year = {2019}, url = {https://doi.org/10.4108/eai.8-4-2019.157414}, doi = {10.4108/EAI.8-4-2019.157414}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/HeHC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HomoliakTOBHH19, author = {Ivan Homoliak and Martin Teknos and Mart{\'{\i}}n Ochoa and Dominik Breitenbacher and Saeid Hosseini and Petr Han{\'{a}}cek}, title = {Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {17}, pages = {e4}, year = {2019}, url = {https://doi.org/10.4108/eai.10-1-2019.156245}, doi = {10.4108/EAI.10-1-2019.156245}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/HomoliakTOBHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/JaferKRZ19, author = {Muhammad Jafer and M. Arif Khan and Sabih ur Rehman and Tanveer A. Zia}, title = {Secure Communication in {VANET} Broadcasting}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {17}, pages = {e2}, year = {2019}, url = {https://doi.org/10.4108/eai.10-1-2019.156243}, doi = {10.4108/EAI.10-1-2019.156243}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/JaferKRZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/KhaliliZBWSZ19, author = {Mina Khalili and Mengyuan Zhang and Daniel Borbor and Lingyu Wang and Nicandro Scarabeo and Michel{-}Ange Zamor}, title = {Monitoring and Improving Managed Security Services inside a Security Operation Center}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {18}, pages = {e1}, year = {2019}, url = {https://doi.org/10.4108/eai.8-4-2019.157413}, doi = {10.4108/EAI.8-4-2019.157413}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/KhaliliZBWSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LiWS19, author = {Yue Li and Haining Wang and Kun Sun}, title = {BluePass: {A} Mobile Device Assisted Password Manager}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {17}, pages = {e3}, year = {2019}, url = {https://doi.org/10.4108/eai.10-1-2019.156244}, doi = {10.4108/EAI.10-1-2019.156244}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/LiWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LiXL19, author = {Yi Li and Kaiqi Xiong and Xiangyang Li}, title = {Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {21}, pages = {e3}, year = {2019}, url = {https://doi.org/10.4108/eai.13-7-2018.162809}, doi = {10.4108/EAI.13-7-2018.162809}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/LiXL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LiuHCL19, author = {Anyi Liu and Selena Haidar and Yuan Cheng and Yingjiu Li}, title = {Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {20}, pages = {e3}, year = {2019}, url = {https://doi.org/10.4108/eai.13-7-2018.162290}, doi = {10.4108/EAI.13-7-2018.162290}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/LiuHCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LiuZCYS19, author = {Naiwei Liu and Wanyu Zang and Songqing Chen and Meng Yu and Ravi S. Sandhu}, title = {Adaptive Noise Injection against Side-Channel Attacks on {ARM} Platform}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {19}, pages = {e1}, year = {2019}, url = {https://doi.org/10.4108/eai.25-1-2019.159346}, doi = {10.4108/EAI.25-1-2019.159346}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/LiuZCYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LuoQNZL19, author = {Zhengping Luo and Zhe Qu and Tung Thanh Nguyen and Hui Zeng and Zhuo Lu}, title = {Security of {HPC} Systems: From a Log-analyzing Perspective}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {21}, pages = {e5}, year = {2019}, url = {https://doi.org/10.4108/eai.19-8-2019.163134}, doi = {10.4108/EAI.19-8-2019.163134}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/LuoQNZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MaZ19, author = {Qiumao Ma and Wensheng Zhang}, title = {Octopus {ORAM:} An Oblivious {RAM} with Communication and Server Storage Efficiency}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {20}, pages = {e5}, year = {2019}, url = {https://doi.org/10.4108/eai.29-4-2019.162405}, doi = {10.4108/EAI.29-4-2019.162405}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/MaZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MeyerR19, author = {Andrew Meyer and Sankardas Roy}, title = {Do Metadata-based Deleted-File-Recovery {(DFR)} Tools Meet {NIST} Guidelines?}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {21}, pages = {e4}, year = {2019}, url = {https://doi.org/10.4108/eai.13-7-2018.163091}, doi = {10.4108/EAI.13-7-2018.163091}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/MeyerR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/PerezASE19, author = {Rocio Lopez Perez and Florian Adamsky and Ridha Soua and Thomas Engel}, title = {Forget the Myth of the Air Gap: Machine Learning for Reliable Intrusion Detection in {SCADA} Systems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {19}, pages = {e3}, year = {2019}, url = {https://doi.org/10.4108/eai.25-1-2019.159348}, doi = {10.4108/EAI.25-1-2019.159348}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/PerezASE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/SachidanandaBE19, author = {Vinay Sachidananda and Suhas Bhairav and Yuval Elovici}, title = {Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {20}, pages = {e1}, year = {2019}, url = {https://doi.org/10.4108/eai.13-7-2018.159803}, doi = {10.4108/EAI.13-7-2018.159803}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/SachidanandaBE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/SongWZW19, author = {Yang Song and Chen Wu and Sencun Zhu and Haining Wang}, title = {A Machine Learning Based Approach for Mobile App Rating Manipulation Detection}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {18}, pages = {e3}, year = {2019}, url = {https://doi.org/10.4108/eai.8-4-2019.157415}, doi = {10.4108/EAI.8-4-2019.157415}, timestamp = {Mon, 24 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/SongWZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/TangLAZH19, author = {Yuzhe Richard Tang and Kai Li and Katchaguy Areekijseree and Shuigeng Zhou and Liting Hu}, title = {Privacy-Preserving Multi-Party Directory Services}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {19}, pages = {e5}, year = {2019}, url = {https://doi.org/10.4108/eai.29-7-2019.159627}, doi = {10.4108/EAI.29-7-2019.159627}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/TangLAZH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/WangW19, author = {Li Wang and Dinghao Wu}, title = {Bridging the Gap Between Security Tools and {SDN} Controllers}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {17}, pages = {e1}, year = {2019}, url = {https://doi.org/10.4108/eai.10-1-2019.156242}, doi = {10.4108/EAI.10-1-2019.156242}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/WangW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/WangYLCYYJH19, author = {Chonghua Wang and Libo Yin and Jun Li and Xuehong Chen and Rongchao Yin and Xiaochun Yun and Yang Jiao and Zhiyu Hao}, title = {HProve: {A} Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {18}, pages = {e5}, year = {2019}, url = {https://doi.org/10.4108/eai.8-4-2019.157417}, doi = {10.4108/EAI.8-4-2019.157417}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/WangYLCYYJH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/XueCVL19, author = {Hongfa Xue and Yurong Chen and Guru Venkataramani and Tian Lan}, title = {{AMASS:} Automated Software Mass Customization via Feature Identification and Tailoring}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {20}, pages = {e4}, year = {2019}, url = {https://doi.org/10.4108/eai.13-7-2018.162291}, doi = {10.4108/EAI.13-7-2018.162291}, timestamp = {Thu, 05 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/XueCVL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ZhangZWC19, author = {Wei Zhang and Jingwen Zhao and Fengqiong Wei and Yunfang Chen}, title = {Differentially Private High-Dimensional Data Publication via Markov Network}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {19}, pages = {e4}, year = {2019}, url = {https://doi.org/10.4108/eai.29-7-2019.159626}, doi = {10.4108/EAI.29-7-2019.159626}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/ZhangZWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/CeesayMW18, author = {Ebrima N. Ceesay and K. Myers and Paul A. Watters}, title = {Human-centered strategies for cyber-physical systems security}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {14}, pages = {e5}, year = {2018}, url = {https://doi.org/10.4108/eai.15-5-2018.154773}, doi = {10.4108/EAI.15-5-2018.154773}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/CeesayMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ChinXR18, author = {Tommy Chin and Kaiqi Xiong and Mohamed Rahouti}, title = {Kernel-Space Intrusion Detection Using Software-Defined Networking}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {15}, pages = {e2}, year = {2018}, url = {https://doi.org/10.4108/eai.13-7-2018.155168}, doi = {10.4108/EAI.13-7-2018.155168}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/ChinXR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/GuanFPGGL18, author = {Le Guan and Sadegh Farhang and Yu Pu and Pinyao Guo and Jens Grossklags and Peng Liu}, title = {VaultIME: Regaining User Control for Password Managers through Auto-correction}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {14}, pages = {e4}, year = {2018}, url = {https://doi.org/10.4108/eai.15-5-2018.154772}, doi = {10.4108/EAI.15-5-2018.154772}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/GuanFPGGL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HadjKBE18, author = {Maryem Ait El Hadj and Ahmed Khoumsi and Yahya Benkaouz and Mohammed Erradi}, title = {Formal Approach to Detect and Resolve Anomalies while Clustering {ABAC} Policies}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {16}, pages = {e3}, year = {2018}, url = {https://doi.org/10.4108/eai.13-7-2018.156003}, doi = {10.4108/EAI.13-7-2018.156003}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/HadjKBE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HuangZY18, author = {Chu Huang and Sencun Zhu and Yi Yang}, title = {An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {13}, pages = {e4}, year = {2018}, url = {https://doi.org/10.4108/eai.4-1-2018.153527}, doi = {10.4108/EAI.4-1-2018.153527}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/HuangZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/KamalakannanT18, author = {V. Kamalakannan and S. Tamilselvan}, title = {{FPGA} Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {15}, pages = {e4}, year = {2018}, url = {https://doi.org/10.4108/eai.15-10-2018.155739}, doi = {10.4108/EAI.15-10-2018.155739}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/KamalakannanT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/KaramiWC18, author = {Mohammad Karami and An Wang and Songqing Chen}, title = {Attribution of Economic Denial of Sustainability Attacks in Public Clouds}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {13}, pages = {e2}, year = {2018}, url = {https://doi.org/10.4108/eai.4-1-2018.153525}, doi = {10.4108/EAI.4-1-2018.153525}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/KaramiWC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MaglarasDNR18, author = {Leandros Maglaras and George Drivas and Kleanthis Noou and Stylianos Rallis}, title = {{NIS} directive: The case of Greece}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {14}, pages = {e1}, year = {2018}, url = {https://doi.org/10.4108/eai.15-5-2018.154769}, doi = {10.4108/EAI.15-5-2018.154769}, timestamp = {Fri, 12 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/MaglarasDNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MaglarasFDMJR18, author = {Leandros Maglaras and Mohamed Amine Ferrag and Abdelouahid Derhab and Mithun Mukherjee and Helge Janicke and Stylianos Rallis}, title = {Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {16}, pages = {e1}, year = {2018}, url = {https://doi.org/10.4108/eai.15-10-2018.155856}, doi = {10.4108/EAI.15-10-2018.155856}, timestamp = {Fri, 12 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/MaglarasFDMJR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MengLWZZ18, author = {Fanhao Meng and Rongheng Lin and Zhuoran Wang and Hua Zou and Shiqi Zhou}, title = {A Multi-connection Encryption Algorithm Applied in Secure Channel Service System}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {15}, pages = {e1}, year = {2018}, url = {https://doi.org/10.4108/eai.15-5-2018.155167}, doi = {10.4108/EAI.15-5-2018.155167}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/MengLWZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MohaisenAPKNM18, author = {Aziz Mohaisen and Omar Alrawi and Jeman Park and Joongheon Kim and DaeHun Nyang and Manar Mohaisen}, title = {Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {16}, pages = {e2}, year = {2018}, url = {https://doi.org/10.4108/eai.13-7-2018.156002}, doi = {10.4108/EAI.13-7-2018.156002}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/MohaisenAPKNM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/QuHW18, author = {Wenyu Qu and Wei Huo and Lingyu Wang}, title = {Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {16}, pages = {e5}, year = {2018}, url = {https://doi.org/10.4108/eai.11-12-2018.156032}, doi = {10.4108/EAI.11-12-2018.156032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/QuHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/RizzettiSRMC18, author = {Tiago Ant{\^{o}}nio Rizzetti and Bol{\'{\i}}var Menezes da Silva and Alexandre Silva Rodrigues and Rafael Gressler Milbradt and Luciane Neves Canha}, title = {A secure and lightweight multicast communication system for Smart Grids}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {16}, pages = {e4}, year = {2018}, url = {https://doi.org/10.4108/eai.13-7-2018.156004}, doi = {10.4108/EAI.13-7-2018.156004}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/RizzettiSRMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/RjaibiR18, author = {Neila Rjaibi and Latifa Ben Arfa Rabai}, title = {How Stakeholders Perceived Security Risks? {A} New Predictive Functional Level Model and its Application to E-Learning}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {15}, pages = {e3}, year = {2018}, url = {https://doi.org/10.4108/eai.15-10-2018.155738}, doi = {10.4108/EAI.15-10-2018.155738}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/RjaibiR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/SunDSL18, author = {Xiaoyan Sun and Jun Dai and Anoop Singhal and Peng Liu}, title = {Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {13}, pages = {e3}, year = {2018}, url = {https://doi.org/10.4108/eai.4-1-2018.153526}, doi = {10.4108/EAI.4-1-2018.153526}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/SunDSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/WangYR18, author = {Zheng Wang and Shui Yu and Scott Rose}, title = {An On-Demand Defense Scheme Against {DNS} Cache Poisoning Attacks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {14}, pages = {e3}, year = {2018}, url = {https://doi.org/10.4108/eai.15-5-2018.154771}, doi = {10.4108/EAI.15-5-2018.154771}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/WangYR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/Witte18, author = {Tim Niklas Witte}, title = {Mouse Underlaying: Global Key and Mouse Listener Based on an Almost Invisible Window with Local Listeners and Sophisticated Focus}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {15}, pages = {e5}, year = {2018}, url = {https://doi.org/10.4108/eai.15-10-2018.155740}, doi = {10.4108/EAI.15-10-2018.155740}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/Witte18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/Xiong18, author = {Kaiqi Xiong}, title = {The performance analysis of public key cryptography-based authentication}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {14}, pages = {e2}, year = {2018}, url = {https://doi.org/10.4108/eai.15-5-2018.154770}, doi = {10.4108/EAI.15-5-2018.154770}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/Xiong18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/XuCGXS18, author = {Lei Xu and Lin Chen and Zhimin Gao and Shouhuai Xu and Weidong Shi}, title = {Efficient Public Blockchain Client for Lightweight Users}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {13}, pages = {e5}, year = {2018}, url = {https://doi.org/10.4108/eai.4-1-2018.153528}, doi = {10.4108/EAI.4-1-2018.153528}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/XuCGXS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ZhuJM18, author = {Sencun Zhu and Kevin I. Jones and Leandros A. Maglaras}, title = {Defence Mechanisms for Public Systems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {13}, pages = {e1}, year = {2018}, url = {https://doi.org/10.4108/eai.4-1-2018.153524}, doi = {10.4108/EAI.4-1-2018.153524}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/ZhuJM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/BalenBW17, author = {Nicolas Van Balen and Christopher T. Ball and Haining Wang}, title = {Analysis of Targeted Mouse Movements for Gender Classification}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {11}, pages = {e3}, year = {2017}, url = {https://doi.org/10.4108/eai.7-12-2017.153395}, doi = {10.4108/EAI.7-12-2017.153395}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/BalenBW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ChengWZ17, author = {Leixiao Cheng and Quanshui Wu and Yunlei Zhao}, title = {Compact lossy and all-but-one trapdoor functions from lattice}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {12}, pages = {e4}, year = {2017}, url = {https://doi.org/10.4108/eai.28-12-2017.153517}, doi = {10.4108/EAI.28-12-2017.153517}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/ChengWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/DongYCLZ17, author = {Qi Dong and Zekun Yang and Yu Chen and Xiaohua Li and Kai Zeng}, title = {Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {12}, pages = {e3}, year = {2017}, url = {https://doi.org/10.4108/eai.28-12-2017.153516}, doi = {10.4108/EAI.28-12-2017.153516}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/DongYCLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/KannanWCBDB17, author = {Subramaniyam Kannan and Paul Wood and Somali Chaterji and Saurabh Bagchi and Larry Deatrick and Patricia Beane}, title = {{MAAT:} Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {11}, pages = {e4}, year = {2017}, url = {https://doi.org/10.4108/eai.7-12-2017.153396}, doi = {10.4108/EAI.7-12-2017.153396}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/KannanWCBDB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/Leca17, author = {Cristian Liviu Leca}, title = {Overview of Romania 802.11Wireless Security {\&} Statistics}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {12}, pages = {e5}, year = {2017}, url = {https://doi.org/10.4108/eai.28-12-2017.153518}, doi = {10.4108/EAI.28-12-2017.153518}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/Leca17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LiOMMG17, author = {Yongfeng Li and Jinbin Ouyang and Bing Mao and Kai Ma and Shanqing Guo}, title = {Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {11}, pages = {e2}, year = {2017}, url = {https://doi.org/10.4108/eai.7-12-2017.153394}, doi = {10.4108/EAI.7-12-2017.153394}, timestamp = {Mon, 16 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/LiOMMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/NiyazSJ17, author = {Quamar Niyaz and Weiqing Sun and Ahmad Y. Javaid}, title = {A Deep Learning Based DDoS Detection System in Software-Defined Networking {(SDN)}}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {12}, pages = {e2}, year = {2017}, url = {https://doi.org/10.4108/eai.28-12-2017.153515}, doi = {10.4108/EAI.28-12-2017.153515}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/NiyazSJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/PaladiG17, author = {Nicolae Paladi and Christian Gehrmann}, title = {Bootstrapping trust in software defined networks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {11}, pages = {e5}, year = {2017}, url = {https://doi.org/10.4108/eai.7-12-2017.153397}, doi = {10.4108/EAI.7-12-2017.153397}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/PaladiG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/TanWFCJH17, author = {Zheng Tan and Cheng Wang and Xiaoling Fu and Jipeng Cui and Changjun Jiang and Weili Han}, title = {Re-identification of Vehicular Location-Based Metadata}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {11}, pages = {e1}, year = {2017}, url = {https://doi.org/10.4108/eai.7-12-2017.153393}, doi = {10.4108/EAI.7-12-2017.153393}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/TanWFCJH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ZhuJM17, author = {Sencun Zhu and Kevin I. Jones and Leandros A. Maglaras}, title = {Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {4}, number = {12}, pages = {e1}, year = {2017}, url = {https://doi.org/10.4108/eai.28-12-2017.153514}, doi = {10.4108/EAI.28-12-2017.153514}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/ZhuJM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/AlmajedMSJZ16, author = {Najlaa Almajed and Leandros A. Maglaras and Fran{\c{c}}ois Siewe and Helge Janicke and Pooneh Bagheri Zadeh}, title = {Prevention of crime in {B2C} E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {7}, pages = {e4}, year = {2016}, url = {https://doi.org/10.4108/eai.8-12-2016.151727}, doi = {10.4108/EAI.8-12-2016.151727}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/AlmajedMSJZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/CaseyMKMM16, author = {William Casey and Parisa Memarmoshrefi and Ansgar Kellner and Jose Andre Morales and Bud Mishra}, title = {Identity Deception and Game Deterrence via Signaling Games}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {9}, pages = {e3}, year = {2016}, url = {https://doi.org/10.4108/eai.3-12-2015.2262519}, doi = {10.4108/EAI.3-12-2015.2262519}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/CaseyMKMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/Chatzikonstantinou16, author = {Alexia Chatzikonstantinou and Christoforos Ntantogian and Georgios Karopoulos and Christos Xenakis}, title = {Evaluation of Cryptography Usage in Android Applications}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {9}, pages = {e4}, year = {2016}, url = {https://doi.org/10.4108/eai.3-12-2015.2262471}, doi = {10.4108/EAI.3-12-2015.2262471}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/Chatzikonstantinou16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/CurzonBTC16, author = {Paul Curzon and Ann Blandford and Harold Thimbleby and Anna Louise Cox}, title = {Safer Interactive Medical Device Design: Insights from the {CHI+MED} Project}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {9}, pages = {e1}, year = {2016}, url = {https://doi.org/10.4108/eai.14-10-2015.2261752}, doi = {10.4108/EAI.14-10-2015.2261752}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/CurzonBTC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/DurHM16, author = {Umut Mert Dur and Robert Hammond and Thayer Morrill}, title = {The Secure Boston Mechanism}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {10}, pages = {e5}, year = {2016}, url = {https://doi.org/10.4108/eai.8-8-2015.2260861}, doi = {10.4108/EAI.8-8-2015.2260861}, timestamp = {Mon, 23 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/DurHM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/JanickeJM16, author = {Helge Janicke and Kevin I. Jones and Leandros A. Maglaras}, title = {Security, Privacy and Trust in Cyber Physical Systems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {7}, pages = {e1}, year = {2016}, url = {https://doi.org/10.4108/eai.8-12-2016.151724}, doi = {10.4108/EAI.8-12-2016.151724}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/JanickeJM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/JavaidNSA16, author = {Ahmad Y. Javaid and Quamar Niyaz and Weiqing Sun and Mansoor Alam}, title = {A Deep Learning Approach for Network Intrusion Detection System}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {9}, pages = {e2}, year = {2016}, url = {https://doi.org/10.4108/eai.3-12-2015.2262516}, doi = {10.4108/EAI.3-12-2015.2262516}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/JavaidNSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/KeefeS16, author = {Ken Keefe and William H. Sanders}, title = {Reliability Analysis with Dynamic Reliability Block Diagrams in the M{\"{o}}bius Modeling Tool}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {10}, pages = {e3}, year = {2016}, url = {https://doi.org/10.4108/eai.14-12-2015.2262723}, doi = {10.4108/EAI.14-12-2015.2262723}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/KeefeS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MandalG16, author = {Kalikinkar Mandal and Guang Gong}, title = {Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing {RFID} Applications}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {7}, pages = {e3}, year = {2016}, url = {https://doi.org/10.4108/eai.8-12-2016.151726}, doi = {10.4108/EAI.8-12-2016.151726}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/MandalG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/NoguchiIY16, author = {Wataru Noguchi and Hiroyuki Iizuka and Masahito Yamamoto}, title = {Proposing Multimodal Integration Model Using {LSTM} and Autoencoder}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {10}, pages = {e1}, year = {2016}, url = {https://doi.org/10.4108/eai.3-12-2015.2262505}, doi = {10.4108/EAI.3-12-2015.2262505}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/NoguchiIY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/RayABG16, author = {Apala Ray and Johan {\AA}kerberg and Mats Bj{\"{o}}rkman and Mikael Gidlund}, title = {Assessing Security, Capacity and Reachability of a Heterogeneous Industrial Network during Planning Phase}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {7}, pages = {e5}, year = {2016}, url = {https://doi.org/10.4108/eai.8-12-2016.151728}, doi = {10.4108/EAI.8-12-2016.151728}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/RayABG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/RossiIM16, author = {Gian{-}Luca Dei Rossi and Mauro Iacono and Andrea Marin}, title = {Evaluating the impact of eDoS attacks to cloud facilities}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {10}, pages = {e2}, year = {2016}, url = {https://doi.org/10.4108/eai.14-12-2015.2262650}, doi = {10.4108/EAI.14-12-2015.2262650}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/RossiIM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/Rowe16, author = {Neil C. Rowe}, title = {Identifying forensically uninteresting files in a large corpus}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {7}, pages = {e2}, year = {2016}, url = {https://doi.org/10.4108/eai.8-12-2016.151725}, doi = {10.4108/EAI.8-12-2016.151725}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/Rowe16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ZhangMAH16, author = {Hang Zhang and Parisa Memarmoshrefi and Fatemeh Ashrafi and Dieter Hogrefe}, title = {Investigating the Learning Phase of an Autonomous Authentication in Mobile Ad-hoc Networks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {9}, pages = {e5}, year = {2016}, url = {https://doi.org/10.4108/eai.3-12-2015.2262465}, doi = {10.4108/EAI.3-12-2015.2262465}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/ZhangMAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ZhaoK16, author = {Jianing Zhao and Peter Kemper}, title = {Protecting Encryption Keys in Mobile Systems Against Memory Errors}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {3}, number = {10}, pages = {e4}, year = {2016}, url = {https://doi.org/10.4108/eai.14-12-2015.2262698}, doi = {10.4108/EAI.14-12-2015.2262698}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/ZhaoK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/AhmatMB15, author = {Daouda Ahmat and Damien Magoni and Tegawend{\'{e}} F. Bissyand{\'{e}}}, title = {End-to-End Key Exchange through Disjoint Paths in {P2P} Networks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {3}, pages = {e3}, year = {2015}, url = {https://doi.org/10.4108/sesa.2.3.e3}, doi = {10.4108/SESA.2.3.E3}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/AhmatMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/AlarfiF15, author = {Fahad Alarifi and Maribel Fern{\'{a}}ndez}, title = {Towards Privacy-Preserving Web Metering Via User-Centric Hardware}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {4}, pages = {e4}, year = {2015}, url = {https://doi.org/10.4108/eai.5-10-2015.150478}, doi = {10.4108/EAI.5-10-2015.150478}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/AlarfiF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/BrinnBBBCR15, author = {Marshall Brinn and Nicholas Bastin and Andy C. Bavier and Mark Berman and Jeffrey S. Chase and Robert Ricci}, title = {Trust as the Foundation of Resource Exchange in {GENI}}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {5}, pages = {e1}, year = {2015}, url = {https://doi.org/10.4108/icst.tridentcom.2015.259683}, doi = {10.4108/ICST.TRIDENTCOM.2015.259683}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/BrinnBBBCR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/BurghouwtSS15, author = {Pieter Burghouwt and Marcel E. M. Spruit and Henk J. Sips}, title = {Detection of Botnet Command and Control Traffic by the Multistage Trust Evaluation of Destination Identifiers}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {4}, pages = {e2}, year = {2015}, url = {https://doi.org/10.4108/eai.5-10-2015.150476}, doi = {10.4108/EAI.5-10-2015.150476}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/BurghouwtSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ChenS15, author = {Kai Chen and Jun Shao}, title = {Preface to special issue on miscellaneous emerging security problems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {4}, pages = {e1}, year = {2015}, url = {https://doi.org/10.4108/eai.5-10-2015.150475}, doi = {10.4108/EAI.5-10-2015.150475}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/ChenS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ElashryMS15, author = {Ibrahim F. Elashry and Yi Mu and Willy Susilo}, title = {Mediated Encryption: Analysis and Design}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {3}, pages = {e2}, year = {2015}, url = {https://doi.org/10.4108/sesa.2.3.e2}, doi = {10.4108/SESA.2.3.E2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/ElashryMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/FanMG15, author = {Xinxin Fan and Kalikinkar Mandal and Guang Gong}, title = {{WG-8:} {A} Lightweight Stream Cipher for Resource-Constrained Smart Devices}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {3}, pages = {e4}, year = {2015}, url = {https://doi.org/10.4108/sesa.2.3.e4}, doi = {10.4108/SESA.2.3.E4}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/FanMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/KuglerM15, author = {Christopher Kugler and Tilo M{\"{u}}ller}, title = {Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {4}, pages = {e3}, year = {2015}, url = {https://doi.org/10.4108/eai.5-10-2015.150477}, doi = {10.4108/EAI.5-10-2015.150477}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/KuglerM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LiHZP15, author = {Fangwei Li and Qing Huang and Jiang Zhu and Zhuxun Peng}, title = {Network Security Risk Assessment Based on Item Response Theory}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {5}, pages = {e5}, year = {2015}, url = {https://doi.org/10.4108/icst.mobimedia.2015.259024}, doi = {10.4108/ICST.MOBIMEDIA.2015.259024}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/LiHZP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LiYZX15, author = {Fangwei Li and Wang Yan and Jiang Zhu and Zhang Xinyue}, title = {A Hierarchical of Security Situation Element Acquisition Mechanism in Wireless Sensor Network}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {6}, pages = {e2}, year = {2015}, url = {https://doi.org/10.4108/icst.mobimedia.2015.259030}, doi = {10.4108/ICST.MOBIMEDIA.2015.259030}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/LiYZX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LiZZY15, author = {Fangwei Li and Xinyu Zhang and Jiang Zhu and Wang Yan}, title = {A improved Network Security Situation Awareness Model}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {5}, pages = {e4}, year = {2015}, url = {https://doi.org/10.4108/icst.mobimedia.2015.259032}, doi = {10.4108/ICST.MOBIMEDIA.2015.259032}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/LiZZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LiuSCYCLZ15, author = {Qingzhong Liu and Andrew H. Sung and Lei Chen and Ming Yang and Zhongxue Chen and Yanxin Liu and Jing Zhang}, title = {A Method to Detect {AAC} Audio Forgery}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {6}, pages = {e1}, year = {2015}, url = {https://doi.org/10.4108/icst.mobimedia.2015.259141}, doi = {10.4108/ICST.MOBIMEDIA.2015.259141}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/LiuSCYCLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MaglarasJ15, author = {Leandros A. Maglaras and Jianmin Jiang}, title = {A novel intrusion detection method based on {OCSVM} and K-means recursive clustering}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {3}, pages = {e5}, year = {2015}, url = {https://doi.org/10.4108/sesa.2.3.e5}, doi = {10.4108/SESA.2.3.E5}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/MaglarasJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/StrackxAAP15, author = {Raoul Strackx and Pieter Agten and Niels Avonds and Frank Piessens}, title = {Salus: Kernel Support for Secure Process Compartments}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {3}, pages = {e1}, year = {2015}, url = {https://doi.org/10.4108/sesa.2.3.e1}, doi = {10.4108/SESA.2.3.E1}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/StrackxAAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/SuHSC15, author = {Chung{-}Yen Su and Jeng{-}Ji Huang and Che{-}Yang Shih and Yu{-}Tang Chen}, title = {Reversible and Embedded Watermarking of Medical Images for Telemedicine}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {6}, pages = {e4}, year = {2015}, url = {https://doi.org/10.4108/icst.iniscom.2015.258307}, doi = {10.4108/ICST.INISCOM.2015.258307}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/SuHSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/WangHL15, author = {Yazhe Wang and Mingming Hu and Chen Li}, title = {UAuth: {A} Strong Authentication Method from Personal Devices to Multi-accounts}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {4}, pages = {e5}, year = {2015}, url = {https://doi.org/10.4108/eai.5-10-2015.150479}, doi = {10.4108/EAI.5-10-2015.150479}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/WangHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/WangXLYQ15, author = {Zhaoyuan Wang and Huanlai Xing and Tianrui Li and Yan Yang and Rong Qu}, title = {An Improved {MOEA/D} for QoS Oriented Multimedia Multicasting with Network Coding}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {5}, pages = {e3}, year = {2015}, url = {https://doi.org/10.4108/icst.mobimedia.2015.259094}, doi = {10.4108/ICST.MOBIMEDIA.2015.259094}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/WangXLYQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ZengerZP15, author = {Christian T. Zenger and Jan Zimmer and Christof Paar}, title = {Security Analysis of Quantization Schemes for Channel-based Key Extraction}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {6}, pages = {e5}, year = {2015}, url = {https://doi.org/10.4108/eai.22-7-2015.2260194}, doi = {10.4108/EAI.22-7-2015.2260194}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/ZengerZP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ZhangFHG15, author = {Xiqing Zhang and Yuan Feng and Feng Hong and Zhongwen Guo}, title = {Redundancy Elimination in {DTN} via {ACK} Mechanism}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {6}, pages = {e3}, year = {2015}, url = {https://doi.org/10.4108/icst.mobimedia.2015.259046}, doi = {10.4108/ICST.MOBIMEDIA.2015.259046}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/ZhangFHG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ZhangZSL15, author = {Jing Zhang and Meili Zhi and Yuting Su and Qingzhong Liu}, title = {Mobile Watermarking against Geometrical Distortions}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {5}, pages = {e2}, year = {2015}, url = {https://doi.org/10.4108/icst.mobimedia.2015.259142}, doi = {10.4108/ICST.MOBIMEDIA.2015.259142}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/ZhangZSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/ZhuL15, author = {Minghui Zhu and Peng Liu}, title = {Reviewing the book "Principles of Cyber-physical Systems" from a security perspective}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {2}, number = {4}, pages = {e6}, year = {2015}, url = {https://doi.org/10.4108/eai.5-10-2015.150480}, doi = {10.4108/EAI.5-10-2015.150480}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/ZhuL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/AndrewsFAFCFF13, author = {Dee H. Andrews and Jared Freeman and Terence S. Andre and John Feeney and Alan Carlin and Cali M. Fidopiastis and Patricia Fitzgerald}, title = {Training organizational supervisors to detect and prevent cyber insider threats: two approaches}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {1}, number = {2}, pages = {e4}, year = {2013}, url = {https://doi.org/10.4108/trans.sesa.01-06.2013.e4}, doi = {10.4108/TRANS.SESA.01-06.2013.E4}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/AndrewsFAFCFF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/CookeCRJ13, author = {Nancy J. Cooke and Michael Champion and Prashanth Rajivan and Shree Jariwala}, title = {Cyber situation awareness and teamwork}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {1}, number = {2}, pages = {e5}, year = {2013}, url = {https://doi.org/10.4108/trans.sesa.01-06.2013.e5}, doi = {10.4108/TRANS.SESA.01-06.2013.E5}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/CookeCRJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/CookeM13, author = {Nancy J. Cooke and Michael D. McNeese}, title = {Preface to special issue on the cognitive science of cyber defence analysis}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {1}, number = {2}, pages = {e1}, year = {2013}, url = {https://doi.org/10.4108/trans.sesa.01-06.2013.e1}, doi = {10.4108/TRANS.SESA.01-06.2013.E1}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/CookeM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HaasHPKREAFN13, author = {Michael W. Haas and Leanne M. Hirshfield and P. V. Ponangi and Phani Kidambi and D. Rao and Narasimha Edala and E. Armbrust and Mary Fendley and Sundaram Narayanan}, title = {Decision-making and emotions in the contested information environment}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {1}, number = {2}, pages = {e3}, year = {2013}, url = {https://doi.org/10.4108/trans.sesa.01-06.2013.e3}, doi = {10.4108/TRANS.SESA.01-06.2013.E3}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/HaasHPKREAFN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/NixonM13, author = {Jim Nixon and Barry McGuinness}, title = {Framing the Human Dimension in Cybersecurity}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {1}, number = {2}, pages = {e2}, year = {2013}, url = {https://doi.org/10.4108/trans.sesa.01-06.2013.e2}, doi = {10.4108/TRANS.SESA.01-06.2013.E2}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/NixonM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/TyworthGMMH13, author = {Michael Tyworth and Nicklaus A. Giacobe and Vincent F. Mancuso and Michael D. McNeese and David L. Hall}, title = {A human-in-the-loop approach to understanding situation awareness in cyber defence analysis}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {1}, number = {2}, pages = {e6}, year = {2013}, url = {https://doi.org/10.4108/trans.sesa.01-06.2013.e6}, doi = {10.4108/TRANS.SESA.01-06.2013.E6}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/TyworthGMMH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/Liu11, author = {Peng Liu}, title = {Welcome message from the Editor-in-Chief}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {1}, number = {1}, pages = {e1}, year = {2011}, url = {https://doi.org/10.4108/trans.sesa.2011.e1}, doi = {10.4108/TRANS.SESA.2011.E1}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/Liu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MotahariMJ11, author = {Sara Motahari and Julia M. Mayer and Quentin Jones}, title = {How did you know that about me? Protecting users against unwanted inferences}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {1}, number = {1}, pages = {e3}, year = {2011}, url = {https://doi.org/10.4108/trans.sesa.2011.e3}, doi = {10.4108/TRANS.SESA.2011.E3}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/MotahariMJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/RazaviG11, author = {Maryam Najafian Razavi and Denis Gillet}, title = {A framework for usable end-user privacy control in social software systems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {1}, number = {1}, pages = {e4}, year = {2011}, url = {https://doi.org/10.4108/trans.sesa.2011.e4}, doi = {10.4108/TRANS.SESA.2011.E4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/RazaviG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/XuDL11, author = {Heng Xu and Tamara Dinev and Han Li}, title = {Trust in social computing. The case of peer-to-peer file sharing networks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {1}, number = {1}, pages = {e5}, year = {2011}, url = {https://doi.org/10.4108/trans.sesa.2011.e5}, doi = {10.4108/TRANS.SESA.2011.E5}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/XuDL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/XuT11, author = {Heng Xu and Chuan{-}Hoo Tan}, title = {Introduction to special issue on information privacy and trust in social media}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {1}, number = {1}, pages = {e2}, year = {2011}, url = {https://doi.org/10.4108/trans.sesa.2011.e2}, doi = {10.4108/TRANS.SESA.2011.E2}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/XuT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.