- Chunling Han, Rui Xue:
Aggregation for Privately Trained Different Types of Local Models. EAI Endorsed Trans. Security Safety 7(26): e2 (2020) - Yuan He, Wengjie Wang, Hongyu Sun, Yuqing Zhang:
Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone. EAI Endorsed Trans. Security Safety 7(23): e4 (2020) - Friday Ehi Ikuero, Vasileios Germanos, Laurence Brooks, Wen Zeng:
Is E-voting Systems based on Blockchain Technology Efficient in Nigeria General Elections? EAI Endorsed Trans. Security Safety 7(25): e1 (2020) - Agbotiname Lucky Imoize, Boluwatife Samuel Ben-Adeola, John Adetunji Adebisi:
Development of a Multifactor-Security-Protocol System Using Ambient Noise Synthesis. EAI Endorsed Trans. Security Safety 6(22): e4 (2020) - Lanhang Li, Yuling Luo, Shubin Tang, Lvchen Cao, Xue Ouyang:
Image encryption algorithm using chaotic maps and cellular automata. EAI Endorsed Trans. Security Safety 7(26): e3 (2020) - Yixin Li, Liming Wang, Jing Yang, Zhen Xu, Xi Luo:
deMSF: a Method for Detecting Malicious Server Flocks for Same Campaign. EAI Endorsed Trans. Security Safety 7(26): e1 (2020) - Yan Liu:
User Identity Linkage Method Based on User Online Habit. EAI Endorsed Trans. Security Safety 7(26): e5 (2020) - David Mohaisen, Sencun Zhu:
Editorial. EAI Endorsed Trans. Security Safety 6(22): e1 (2020) - SooHyun Park, Yeongeun Kang, Jeman Park, Joongheon Kim:
Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications. EAI Endorsed Trans. Security Safety 7(23): e5 (2020) - Mingxin Sun, Wenjie Wang, Hantao Feng, Hongu Sun, Yuqing Zhang:
Identify Vulnerability Fix Commits Automatically Using Hierarchical Attention Network. EAI Endorsed Trans. Security Safety 7(23): e2 (2020) - Qais Tasali, Christine Sublett, Eugene Y. Vasserman:
Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems. EAI Endorsed Trans. Security Safety 6(22): e2 (2020) - Yifan Tian, Jiawei Yuan, Yantian Hou:
CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized k-d Forest. EAI Endorsed Trans. Security Safety 6(22): e5 (2020) - Van Trieu-Do, Richard Garcia-Lebron, Maochao Xu, Shouhuai Xu, Yusheng Feng:
Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study. EAI Endorsed Trans. Security Safety 7(25): e4 (2020) - Li Wang:
Shoal: A Network Level Moving Target Defense Engine with Software Defined Networking. EAI Endorsed Trans. Security Safety 7(25): e5 (2020) - Jing Zhang, Yu Wen:
Malware Detection Based on Opcode Dynamic Analysis. EAI Endorsed Trans. Security Safety 7(26): e4 (2020) - 2019
- Nawaf Alhebaishi, Lingyu Wang, Anoop Singhal:
Threat Modeling for Cloud Infrastructures. EAI Endorsed Trans. Security Safety 5(17): e5 (2019) - Saeed Ibrahim Alqahtani, Shujun Li, Haiyue Yuan, Patrice Rusconi:
Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? EAI Endorsed Trans. Security Safety 6(21): e1 (2019) - Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamouha:
Attacker Capability based Dynamic Deception Model for Large-Scale Networks. EAI Endorsed Trans. Security Safety 6(21): e2 (2019) - Vasileios Anastopoulos, Sokratis K. Katsikas:
A Methodology for the Dynamic Design of Adaptive Log Management Infrastructures. EAI Endorsed Trans. Security Safety 6(19): e2 (2019) - Weiqi Cui, Jiangmin Yu, Yanmin Gong, Eric Chan-Tin:
Efficient, Effective, and Realistic Website Fingerprinting Mitigation. EAI Endorsed Trans. Security Safety 6(20): e2 (2019) - Debasis Gountia:
Towards Scalability Trade-off and Security Issues in State-of-the-art Blockchain. EAI Endorsed Trans. Security Safety 5(18): e4 (2019) - Xianmang He, Yuan Hong, Yindong Chen:
Exploring the Privacy Bound for Differential Privacy: From Theory to Practice. EAI Endorsed Trans. Security Safety 5(18): e2 (2019) - Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanácek:
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. EAI Endorsed Trans. Security Safety 5(17): e4 (2019) - Muhammad Jafer, M. Arif Khan, Sabih ur Rehman, Tanveer A. Zia:
Secure Communication in VANET Broadcasting. EAI Endorsed Trans. Security Safety 5(17): e2 (2019) - Mina Khalili, Mengyuan Zhang, Daniel Borbor, Lingyu Wang, Nicandro Scarabeo, Michel-Ange Zamor:
Monitoring and Improving Managed Security Services inside a Security Operation Center. EAI Endorsed Trans. Security Safety 5(18): e1 (2019) - Yue Li, Haining Wang, Kun Sun:
BluePass: A Mobile Device Assisted Password Manager. EAI Endorsed Trans. Security Safety 5(17): e3 (2019) - Yi Li, Kaiqi Xiong, Xiangyang Li:
Applying Machine Learning Techniques to Understand User Behaviors When Phishing Attacks Occur. EAI Endorsed Trans. Security Safety 6(21): e3 (2019) - Anyi Liu, Selena Haidar, Yuan Cheng, Yingjiu Li:
Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log. EAI Endorsed Trans. Security Safety 6(20): e3 (2019) - Naiwei Liu, Wanyu Zang, Songqing Chen, Meng Yu, Ravi S. Sandhu:
Adaptive Noise Injection against Side-Channel Attacks on ARM Platform. EAI Endorsed Trans. Security Safety 6(19): e1 (2019) - Zhengping Luo, Zhe Qu, Tung Thanh Nguyen, Hui Zeng, Zhuo Lu:
Security of HPC Systems: From a Log-analyzing Perspective. EAI Endorsed Trans. Security Safety 6(21): e5 (2019)