default search action
Emerging Trends in Cybersecurity Applications, 2023
- Kevin Daimi, Abeer Alsadoon, Cathryn Peoples, Nour El Madhoun:
Emerging Trends in Cybersecurity Applications. Springer International Publishing 2023, ISBN 978-3-031-09639-6 - Osman Salem, Ahmed Mehaoua:
Ephemeral Elliptic Curve Diffie-Hellman to Secure Data Exchange in Internet of Medical Things. 3-20 - Sairath Bhattacharjya, Hossein Saiedian:
End-to-End Security for IoT Communications: A Practical Implementation. 21-43 - Ly Vu, Quang Uy Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Eryk Dutkiewicz:
A Novel Transfer Learning Model for Intrusion Detection Systems in IoT Networks. 45-65 - Fadi Mohsen, Adel Shtayyeh, Marten Struijk, Riham Naser, Lena Mohammad:
An Approach to Guide Users Towards Less Revealing Internet Browsers. 69-94 - Selahattin Hürol Türen, Md. Rafiqul Islam, Kenneth Eustace:
Analysing the Threat Landscape Inside the Dark Web. 95-122 - João Marques-Silva, Nuno Souto:
A Secured 5G Network Slices Auction Broker. 123-136 - Yvette Colomb, Peter White, Rafiqul Islam, Abeer Alsadoon:
Applying Zero Trust Architecture and Probability-Based Authentication to Preserve Security and Privacy of Data in the Cloud. 137-169 - Germán E. Rodríguez, Jenny G. Torres, Eduardo Benavides-Astudillo:
DataCookie: Sorting Cookies Using Data Mining for Prevention of Cross-Site Scripting (XSS). 171-188 - Chao Chen, Ugur-Ilker Atmaca, Konstantinos Koufos, Mehrdad Dianati, Carsten Maple:
Analysing Cyber Attacks and Risks in V2X-Assisted Autonomous Highway Merging. 191-208 - Nourhène Ben Rabah, Hanen Idoudi:
A Machine Learning Framework for Intrusion Detection in VANET Communications. 209-227 - Jinming Ma, Tianbing Xia, Janusz R. Getta:
The Implementation of Uncertainty Models for Fraud Detection on Mobile Advertising. 231-249 - Nuno Realista, Francisco Palma, Carlos Serrão, Luís Nunes, Ana de Almeida:
Improving Android Application Quality Through Extendable, Automated Security Testing. 251-274 - Rachana Yogesh Patil, Yogesh H. Patil, Aparna Bannore, Arijit Karati, Renu Kachhoriya, Manjiri Ranjanikar:
A Provably Secure Data Sharing Scheme for Smart Gas Grid in Fog Computing Environment. 277-299 - Richard Bean, Yanjun Zhang, Ryan K. L. Ko, Xinyu Mao, Guangdong Bai:
Preserving the Privacy and Cybersecurity of Home Energy Data. 301-322 - Richard Bean, Yanjun Zhang, Ryan K. L. Ko, Xinyu Mao, Guangdong Bai:
Preserving the Privacy and Cybersecurity of Home Energy Data. 323-343 - Jose Rubio-Hernan, Luca De Cicco, Joaquín García-Alfaro:
Non-stationary Watermark-Based Attack Detection to Protect Cyber-Physical Control Systems. 347-370 - Jiao Yin, MingJian Tang, Jinli Cao, Mingshan You, Hua Wang:
Cybersecurity Applications in Software: Data-Driven Software Vulnerability Assessment and Management. 371-389 - Yulliwas Ameur, Samia Bouzefrane, Vincent Audigier:
Application of Homomorphic Encryption in Machine Learning. 391-410 - Cathryn Peoples, Adrian Moore, Nektarios Georgalas:
The Design of Ethical Service-Level Agreements to Protect Cyber Attackers and Attackees. 413-440 - Yuxiao Zhang, Qingfeng Chen, Xinkun Hao, Haiming Pan, Qian Yu, Kexin Huang:
Defense Against Adversarial Attack on Knowledge Graph Embedding. 441-461
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.