default search action
Search dblp for Publications
export results for "toc:db/journals/sesa/sesa8.bht:"
@article{DBLP:journals/sesa/AkhtarF22, author = {Muhammad Shoaib Akhtar and Tao Feng}, title = {A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over {IOT} Layers}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {30}, pages = {5}, year = {2022}, url = {https://doi.org/10.4108/eetss.v8i30.590}, doi = {10.4108/EETSS.V8I30.590}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/AkhtarF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HuangTY22, author = {Zhen Huang and Gang Tan and Xiaowei Yu}, title = {Mitigating Vulnerabilities in Closed Source Software}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {30}, pages = {4}, year = {2022}, url = {https://doi.org/10.4108/eetss.v8i30.253}, doi = {10.4108/EETSS.V8I30.253}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/HuangTY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LuLFI22, author = {Yang Lu and Shujun Li and Alex Alves Freitas and Athina Ioannou}, title = {How data-sharing nudges influence people's privacy preferences: {A} machine learning-based analysis}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {30}, pages = {3}, year = {2022}, url = {https://doi.org/10.4108/eai.21-12-2021.172440}, doi = {10.4108/EAI.21-12-2021.172440}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/LuLFI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MalikT22, author = {Adeel A. Malik and Deepak K. Tosh}, title = {Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {30}, pages = {1}, year = {2022}, url = {https://doi.org/10.4108/eai.25-1-2022.172997}, doi = {10.4108/EAI.25-1-2022.172997}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/MalikT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/WagnerBKC22, author = {Anne Wagner and Anna Bakas and Shelia Kennison and Eric Chan{-}Tin}, title = {Comparing Online Surveys for Cybersecurity: {SONA} and MTurk}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {30}, pages = {2}, year = {2022}, url = {https://doi.org/10.4108/eai.8-2-2022.173334}, doi = {10.4108/EAI.8-2-2022.173334}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/WagnerBKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/BakasWJKC21, author = {Anna Bakas and Anne Wagner and Spencer Johnston and Shelia Kennison and Eric Chan{-}Tin}, title = {Impact of Personality Types and Matching Messaging on Password Strength}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {28}, pages = {e1}, year = {2021}, url = {https://doi.org/10.4108/eai.1-6-2021.170012}, doi = {10.4108/EAI.1-6-2021.170012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/BakasWJKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/BasseyLQ21, author = {Joshua Bassey and Xiangfang Li and Lijun Qian}, title = {Device Authentication Codes based on {RF} Fingerprinting using Deep Learning}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {29}, pages = {e5}, year = {2021}, url = {https://doi.org/10.4108/eai.30-11-2021.172305}, doi = {10.4108/EAI.30-11-2021.172305}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/BasseyLQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HaCLSJ21, author = {Guanxiong Ha and Hang Chen and Ruiqi Li and Wei Shao and Chunfu Jia}, title = {A Rekeying Scheme for Encrypted Deduplication Storage based on {NTRU}}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {27}, pages = {e4}, year = {2021}, url = {https://doi.org/10.4108/eai.25-6-2021.170248}, doi = {10.4108/EAI.25-6-2021.170248}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/HaCLSJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HasanSUHI21, author = {Kamrul Hasan and Sachin Shetty and Sharif Ullah and Amin Hassanzadeh and Tariqul Islam}, title = {Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {28}, pages = {e5}, year = {2021}, url = {https://doi.org/10.4108/eai.10-9-2021.170949}, doi = {10.4108/EAI.10-9-2021.170949}, timestamp = {Wed, 02 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/HasanSUHI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HuffL21, author = {Philip Dale Huff and Qinghua Li}, title = {Towards Automating the Assessment of Software Vulnerability Risk}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {27}, pages = {e3}, year = {2021}, url = {https://doi.org/10.4108/eai.25-6-2021.170247}, doi = {10.4108/EAI.25-6-2021.170247}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/HuffL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/JinW21, author = {Qiuqing Jin and Liming Wang}, title = {Zero-Trust Based Distributed Collaborative Dynamic Access Control Scheme with Deep Multi-Agent Reinforcement Learning}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {27}, pages = {e2}, year = {2021}, url = {https://doi.org/10.4108/eai.25-6-2021.170246}, doi = {10.4108/EAI.25-6-2021.170246}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/JinW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/KosinskiSF21, author = {Tomasz Kosinski and Riccardo Scandariato and Morten Fjeld}, title = {SyntIoT: Privacy and security experimentation in consumer-oriented IoT ecosystems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {27}, pages = {e1}, year = {2021}, url = {https://doi.org/10.4108/eai.25-6-2021.170245}, doi = {10.4108/EAI.25-6-2021.170245}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/KosinskiSF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LiuV21, author = {Hong Liu and Eugene Y. Vasserman}, title = {Side-channel Programming for Software Integrity Checking}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {28}, pages = {e2}, year = {2021}, url = {https://doi.org/10.4108/eai.2-6-2021.170013}, doi = {10.4108/EAI.2-6-2021.170013}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/LiuV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LiuZ21, author = {Zheyuan Liu and Rui Zhang}, title = {Privacy Preserving Collaborative Machine Learning}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {28}, pages = {e3}, year = {2021}, url = {https://doi.org/10.4108/eai.14-7-2021.170295}, doi = {10.4108/EAI.14-7-2021.170295}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/LiuZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/LuoHZZL21, author = {Zhengping Luo and Tao Hou and Xiangrong Zhou and Hui Zeng and Zhuo Lu}, title = {Binary Code Similarity Detection through {LSTM} and Siamese Neural Network}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {29}, pages = {e1}, year = {2021}, url = {https://doi.org/10.4108/eai.14-9-2021.170956}, doi = {10.4108/EAI.14-9-2021.170956}, timestamp = {Mon, 19 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/LuoHZZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MlikiKC21, author = {Hela Mliki and Abir Hadj Kaceam and Lamia Chaari}, title = {A Comprehensive Survey on Intrusion Detection based Machine Learning for IoT Networks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {29}, pages = {e3}, year = {2021}, url = {https://doi.org/10.4108/eai.6-10-2021.171246}, doi = {10.4108/EAI.6-10-2021.171246}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/MlikiKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/PanYL21, author = {Shiying Pan and Can Yang and Runmin Li}, title = {{GIP3:} Make Privacy Preserving be Easier on Cloud}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {27}, pages = {e5}, year = {2021}, url = {https://doi.org/10.4108/eai.25-6-2021.170249}, doi = {10.4108/EAI.25-6-2021.170249}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/PanYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/PathakPRC21, author = {Prabesh Pathak and Prabesh Poudel and Sankardas Roy and Doina Caragea}, title = {Leveraging attention-based deep neural networks for security vetting of Android applications}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {29}, pages = {e2}, year = {2021}, url = {https://doi.org/10.4108/eai.27-9-2021.171168}, doi = {10.4108/EAI.27-9-2021.171168}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/PathakPRC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/RahmanDA21, author = {Mohammad Ashiqur Rahman and Amarjit Datta and Ehab Al{-}Shaer}, title = {Automated Configuration Synthesis for Resilient Smart Metering Infrastructure}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {28}, pages = {e4}, year = {2021}, url = {https://doi.org/10.4108/eai.10-9-2021.170948}, doi = {10.4108/EAI.10-9-2021.170948}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/RahmanDA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/YangLY21, author = {Zezhang Yang and Jian Li and Ping Yang}, title = {FedADMP: {A} Joint Anomaly Detection and Mobility Prediction Framework via Federated Learning}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {29}, pages = {e4}, year = {2021}, url = {https://doi.org/10.4108/eai.21-10-2021.171595}, doi = {10.4108/EAI.21-10-2021.171595}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/YangLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.